Advisory Database
  • Advisories
  • Dependency Scanning
  1. maven
  2. ›
  3. org.apache.commons/commons-text
  4. ›
  5. CVE-2022-42889

CVE-2022-42889: Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')

October 13, 2022 (updated November 29, 2022)

Apache Commons Text performs variable interpolation, allowing properties to be dynamically evaluated and expanded. The standard format for interpolation is “${prefix:name}”, where “prefix” is used to locate an instance of org.apache.commons.text.lookup.StringLookup that performs the interpolation. Starting with version 1.5 and continuing through 1.9, the set of default Lookup instances included interpolators that could result in arbitrary code execution or contact with remote servers. These lookups are: - “script” - execute expressions using the JVM script execution engine (javax.script) - “dns” - resolve dns records - “url” - load values from urls, including from remote servers Applications using the interpolation defaults in the affected versions may be vulnerable to remote code execution or unintentional contact with remote servers if untrusted configuration values are used. Users are recommended to upgrade to Apache Commons Text 1.10.0, which disables the problematic interpolators by default.

References

  • www.openwall.com/lists/oss-security/2022/10/13/4
  • github.com/advisories/GHSA-599f-7c49-w659
  • lists.apache.org/thread/n2bd4vdsgkqh2tm14l1wyc3jyol7s1om
  • nvd.nist.gov/vuln/detail/CVE-2022-42889

Code Behaviors & Features

Detect and mitigate CVE-2022-42889 with GitLab Dependency Scanning

Secure your software supply chain by verifying that all open source dependencies used in your projects contain no disclosed vulnerabilities. Learn more about Dependency Scanning →

Affected versions

All versions starting from 1.5 before 1.10.0

Fixed versions

  • 1.10.0

Solution

Upgrade to version 1.10.0 or above.

Impact 9.8 CRITICAL

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H

Learn more about CVSS

Weakness

  • CWE-94: Improper Control of Generation of Code ('Code Injection')

Source file

maven/org.apache.commons/commons-text/CVE-2022-42889.yml

Spotted a mistake? Edit the file on GitLab.

  • Site Repo
  • About GitLab
  • Terms
  • Privacy Statement
  • Contact

Page generated Wed, 14 May 2025 12:16:02 +0000.