9.8
CVE-2022-42889
- EPSS 94.16%
- Veröffentlicht 13.10.2022 13:15:10
- Zuletzt bearbeitet 21.11.2024 07:25:32
- Quelle security@apache.org
- Teams Watchlist Login
- Unerledigt Login
Apache Commons Text performs variable interpolation, allowing properties to be dynamically evaluated and expanded. The standard format for interpolation is "${prefix:name}", where "prefix" is used to locate an instance of org.apache.commons.text.lookup.StringLookup that performs the interpolation. Starting with version 1.5 and continuing through 1.9, the set of default Lookup instances included interpolators that could result in arbitrary code execution or contact with remote servers. These lookups are: - "script" - execute expressions using the JVM script execution engine (javax.script) - "dns" - resolve dns records - "url" - load values from urls, including from remote servers Applications using the interpolation defaults in the affected versions may be vulnerable to remote code execution or unintentional contact with remote servers if untrusted configuration values are used. Users are recommended to upgrade to Apache Commons Text 1.10.0, which disables the problematic interpolators by default.
Daten sind bereitgestellt durch National Vulnerability Database (NVD)
Apache ≫ Commons Text Version >= 1.5 < 1.10.0
Juniper ≫ Security Threat Response Manager Version < 7.5.0
Juniper ≫ Security Threat Response Manager Version7.5.0 Update-
Juniper ≫ Security Threat Response Manager Version7.5.0 Updateup1
Juniper ≫ Security Threat Response Manager Version7.5.0 Updateup2
Zu dieser CVE wurde keine CISA KEV oder CERT.AT-Warnung gefunden.
Typ | Quelle | Score | Percentile |
---|---|---|---|
EPSS | FIRST.org | 94.16% | 0.999 |
Quelle | Base Score | Exploit Score | Impact Score | Vector String |
---|---|---|---|---|
nvd@nist.gov | 9.8 | 3.9 | 5.9 |
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
|
CWE-94 Improper Control of Generation of Code ('Code Injection')
The product constructs all or part of a code segment using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify the syntax or behavior of the intended code segment.