CVE-2022-42889

Apache Commons Text prior to 1.10.0 allows RCE when applied to untrusted input due to insecure interpolation defaults

Basic Information

CVE State
PUBLISHED
Reserved Date
October 12, 2022
Published Date
October 13, 2022
Last Updated
November 20, 2024
Vendor
Apache Software Foundation
Product
Apache Commons Text
Description
Apache Commons Text performs variable interpolation, allowing properties to be dynamically evaluated and expanded. The standard format for interpolation is "${prefix:name}", where "prefix" is used to locate an instance of org.apache.commons.text.lookup.StringLookup that performs the interpolation. Starting with version 1.5 and continuing through 1.9, the set of default Lookup instances included interpolators that could result in arbitrary code execution or contact with remote servers. These lookups are: - "script" - execute expressions using the JVM script execution engine (javax.script) - "dns" - resolve dns records - "url" - load values from urls, including from remote servers Applications using the interpolation defaults in the affected versions may be vulnerable to remote code execution or unintentional contact with remote servers if untrusted configuration values are used. Users are recommended to upgrade to Apache Commons Text 1.10.0, which disables the problematic interpolators by default.
Tags
apache metasploit_scanner

CVSS Scores

CVSS v3.1

9.8 - CRITICAL

Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H

EPSS Score

Score
94.16% (Percentile: 99.90%) as of 2025-05-12

SSVC Information

Exploitation
none
Automatable
Yes
Technical Impact
total

Exploit Status

Exploited in the Wild
Yes (2022-10-20 11:40:50 UTC) Source

Known Exploited Vulnerability Information

Source Added Date
Wordfence 2022-10-20 11:40:50 UTC

Scanner Integrations

Potential Proof of Concepts

Warning: These PoCs have not been tested and could contain malware. Use at your own risk.

apache_commons_text4shell

Type: metasploit • Created: Unknown

Metasploit module for CVE-2022-42889

808ale/CVE-2022-42889-Text4Shell-POC

Type: github • Created: 2023-06-27 08:29:24 UTC • Stars: 14

This repository contains a Python script to automate the process of testing for a vulnerability known as Text4Shell, referenced under the CVE id: CVE-2022-42889.

sunnyvale-it/CVE-2022-42889-PoC

Type: github • Created: 2022-11-05 07:32:51 UTC • Stars: 2

CVE-2022-42889 (a.k.a. Text4Shell) RCE Proof of Concept

cryxnet/CVE-2022-42889-RCE

Type: github • Created: 2022-11-04 19:26:23 UTC • Stars: 18

Proof of Concept for CVE-2022-42889 (Text4Shell Vulnerability)

cxzero/CVE-2022-42889-text4shell

Type: github • Created: 2022-10-23 13:42:23 UTC • Stars: 21

CVE-2022-42889 aka Text4Shell research & PoC

0xmaximus/Apache-Commons-Text-CVE-2022-42889

Type: github • Created: 2022-10-23 08:33:02 UTC • Stars: 2

Apache Text4Shell (CVE-2022-42889) Burp Bounty Profile

akshayithape-devops/CVE-2022-42889-POC

Type: github • Created: 2022-10-23 05:48:48 UTC • Stars: 6

A simple dockerize application that shows how to exploit the CVE-2022-42889 vulnerability.

s3l33/CVE-2022-42889

Type: github • Created: 2022-10-22 02:06:40 UTC • Stars: 3

python script for CVE-2022-42889

humbss/CVE-2022-42889

Type: github • Created: 2022-10-21 13:48:04 UTC • Stars: 2

kljunowsky/CVE-2022-42889-text4shell

Type: github • Created: 2022-10-19 11:49:08 UTC • Stars: 55

Apache commons text - CVE-2022-42889 Text4Shell proof of concept exploit.

korteke/CVE-2022-42889-POC

Type: github • Created: 2022-10-18 23:15:40 UTC • Stars: 13

A simple application that shows how to exploit the CVE-2022-42889 vulnerability

SeanWrightSec/CVE-2022-42889-PoC

Type: github • Created: 2022-10-17 18:50:36 UTC • Stars: 34

Proof of Concept for the Apache commons-text vulnerability CVE-2022-42889.

Timeline

  • CVE ID Reserved

  • CVE Published to Public

  • Added to KEVIntel

  • Detected by Metasploit