Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

redhat логотип

CVE-2022-33980

Опубликовано: 06 июл. 2022
Источник: redhat
CVSS3: 7.5
EPSS Высокий

Описание

Apache Commons Configuration performs variable interpolation, allowing properties to be dynamically evaluated and expanded. The standard format for interpolation is "${prefix:name}", where "prefix" is used to locate an instance of org.apache.commons.configuration2.interpol.Lookup that performs the interpolation. Starting with version 2.4 and continuing through 2.7, the set of default Lookup instances included interpolators that could result in arbitrary code execution or contact with remote servers. These lookups are: - "script" - execute expressions using the JVM script execution engine (javax.script) - "dns" - resolve dns records - "url" - load values from urls, including from remote servers Applications using the interpolation defaults in the affected versions may be vulnerable to remote code execution or unintentional contact with remote servers if untrusted configuration values are used. Users are recommended to upgrade to Apache Commons Configuration 2.8.0, which disables the problematic interpolators by default.

A flaw was found in Apache Commons Configuration's variable interpolation, which by default included several lookup actions that could permit script invocation on remote servers. This issue could allow an attacker to use one of these actions to send a request to execute arbitrary code on the server.

Отчет

Red Hat Satellite embeds affected commons-configuration2 with Candlepin, however, product is not affected since vulnerable org.apache.commons.configuration2.interpol.Lookup is not exposed in code. Product Security has rated this vulnerability Low for Satellite and there is no harm identified to confidentiality, integrity, and availability.

Затронутые пакеты

ПлатформаПакетСостояниеРекомендацияРелиз
A-MQ Clients 2commons-configuration2Not affected
Red Hat A-MQ Onlinecommons-configuration2Not affected
Red Hat build of Quarkuscommons-configuration2Not affected
Red Hat Data Grid 8commons-configuration2Not affected
Red Hat Decision Manager 7commons-configuration2Out of support scope
Red Hat Integration Camel K 1commons-configuration2Affected
Red Hat JBoss Data Grid 7commons-configuration2Out of support scope
Red Hat JBoss Enterprise Application Platform 7commons-configuration2Not affected
Red Hat JBoss Enterprise Application Platform Expansion Packcommons-configuration2Not affected
Red Hat OpenShift Container Platform 3.11jenkins-2-pluginsWill not fix

Показывать по

Дополнительная информация

Статус:

Moderate
https://bugzilla.redhat.com/show_bug.cgi?id=2105067apache-commons-configuration: Apache Commons Configuration insecure interpolation defaults

EPSS

Процентиль: 99%
0.86659
Высокий

7.5 High

CVSS3

Связанные уязвимости

CVSS3: 9.8
ubuntu
больше 3 лет назад

Apache Commons Configuration performs variable interpolation, allowing properties to be dynamically evaluated and expanded. The standard format for interpolation is "${prefix:name}", where "prefix" is used to locate an instance of org.apache.commons.configuration2.interpol.Lookup that performs the interpolation. Starting with version 2.4 and continuing through 2.7, the set of default Lookup instances included interpolators that could result in arbitrary code execution or contact with remote servers. These lookups are: - "script" - execute expressions using the JVM script execution engine (javax.script) - "dns" - resolve dns records - "url" - load values from urls, including from remote servers Applications using the interpolation defaults in the affected versions may be vulnerable to remote code execution or unintentional contact with remote servers if untrusted configuration values are used. Users are recommended to upgrade to Apache Commons Configuration 2.8.0, which disables the ...

CVSS3: 9.8
nvd
больше 3 лет назад

Apache Commons Configuration performs variable interpolation, allowing properties to be dynamically evaluated and expanded. The standard format for interpolation is "${prefix:name}", where "prefix" is used to locate an instance of org.apache.commons.configuration2.interpol.Lookup that performs the interpolation. Starting with version 2.4 and continuing through 2.7, the set of default Lookup instances included interpolators that could result in arbitrary code execution or contact with remote servers. These lookups are: - "script" - execute expressions using the JVM script execution engine (javax.script) - "dns" - resolve dns records - "url" - load values from urls, including from remote servers Applications using the interpolation defaults in the affected versions may be vulnerable to remote code execution or unintentional contact with remote servers if untrusted configuration values are used. Users are recommended to upgrade to Apache Commons Configuration 2.8.0, which disables the pro

CVSS3: 9.8
debian
больше 3 лет назад

Apache Commons Configuration performs variable interpolation, allowing ...

CVSS3: 9.8
github
больше 3 лет назад

Code injection in Apache Commons Configuration

CVSS3: 6.6
fstec
больше 3 лет назад

Уязвимость библиотеки Apache Commons Configuration, связанная с неверным управлением генерацией кода, позволяющая нарушителю выполнить произвольный код

EPSS

Процентиль: 99%
0.86659
Высокий

7.5 High

CVSS3