Skip to main content

CRITICAL-SEVERITY FLAW IN APACHE COMMONS TEXT LIBRARY FIXED


Jasper_The_Rasper
Moderator
Forum|alt.badge.img+54

October 17, 2022 By Lindsey O’Donnell-Welch 

 

The Apache Software Foundation (ASF) has released a fix for a critical-severity vulnerability in certain versions of the Apache Commons Text library that could enable remote code execution. However, details about the severity and scope of the vulnerability are still emerging, including the detection of any examples of real-world applications using vulnerable configurations of the impacted library.

The flaw (CVE-2022-42889) exists in Apache Commons Text, a library released in 2017 - and a component of the broader Apache Commons project that provides a number of Java utility programming toolkits - that focuses on algorithms enabling a variety of functionalities around strings. The issue stems from specific ways that the library performs a process called variable interpolation, which is the evaluation of the properties of strings that contain placeholders in order for the placeholders to be replaced with their corresponding values. In order to do so, Apache Commons Text treats text wrapped in "${prefix:name}", where the "prefix" locates an instance of org.apache.commons.text.lookup.StringLookup, which then performs the interpolation. However, in certain versions of the library that date back to 2018, a number of default lookup instances included interpolators that could result in arbitrary code execution or contact with remote servers, according to ASF in an advisory last week.

 

>> Full Article <<

3 replies

Jamesharris85
New Voice
Forum|alt.badge.img+4

Out of interest where do you find all of this stuff Jasper?!


Martin.1
Popular Voice
Forum|alt.badge.img+4
  • Popular Voice
  • 424 replies
  • October 20, 2022

A critical flaw patched in the Apache Commons Text library has sparked comparisons with the ‘Log4Shell’ bug that surfaced in the near-ubiquitous open source component Log4j last year.

However, the researcher who found and reported the Commons Text flaw in March has downplayed its comparative impact, while acknowledging a resemblance to the ‘Log4Shell’ vulnerability that is widely recognized as one of the most severe flaws of all time.

Lookup link

“The vulnerability is indeed very similar,” GitHub Security Lab principal researcher Alvaro Muñoz told The Daily Swig.

“The Apache Commons Text code appears to be based on the Log4j code, as both of them enable interpolation of multiple Lookup sources. Log4j enabled JNDI lookups [while] Apache Commons Text and Apache Commons Configuration allows script lookups – both could lead to RCE. The impact is, therefore, very high.

“However, it is worth keeping in mind that an issue's severity is calculated based on both the impact and the likelihood, and for the Apache Commons Text, the likelihood of untrusted data flowing to ACT's sink is much lower.”

 

Full Articlehttps://portswigger.net/daily-swig/apache-commons-text-rce-resemblance-to-log4shell-but-exposure-risk-is-much-lower


Jasper_The_Rasper
Moderator
Forum|alt.badge.img+54

Exploit Attempts Underway for Apache Commons Text4Shell Vulnerability

 

The good news: The Apache Commons Text library bug is far less likely to lead to exploitation than last year's Log4j library flaw.

 

October 21, 2022 By Dark Reading Staff

 

The Text4Shell vulnerability, tracked under CVE-2022-42889, started drawing potentially malicious activity this week.

Researchers at Wordfence issued a threat advisory urging security teams to update their Apache Commons Text library to the patched version 1.10.0. The team began monitoring Text4Shell, which has been given a CVSS score of 9.8, on Oct. 17, and by Oct. 18 they started seeing attempts to exploit it.

 

>> Full Article <<