CVE-2022-42889
Apache Commons Text prior to 1.10.0 allows RCE when applied to untrusted input due to insecure interpolation defaults
Basic Information
- CVE State
- PUBLISHED
- Reserved Date
- October 12, 2022
- Published Date
- October 13, 2022
- Last Updated
- November 20, 2024
- Vendor
- Apache Software Foundation
- Product
- Apache Commons Text
- Description
- Apache Commons Text performs variable interpolation, allowing properties to be dynamically evaluated and expanded. The standard format for interpolation is "${prefix:name}", where "prefix" is used to locate an instance of org.apache.commons.text.lookup.StringLookup that performs the interpolation. Starting with version 1.5 and continuing through 1.9, the set of default Lookup instances included interpolators that could result in arbitrary code execution or contact with remote servers. These lookups are: - "script" - execute expressions using the JVM script execution engine (javax.script) - "dns" - resolve dns records - "url" - load values from urls, including from remote servers Applications using the interpolation defaults in the affected versions may be vulnerable to remote code execution or unintentional contact with remote servers if untrusted configuration values are used. Users are recommended to upgrade to Apache Commons Text 1.10.0, which disables the problematic interpolators by default.
- Tags
- Score
- 94.16% (Percentile: 99.90%) as of 2025-05-12
- Exploitation
- none
- Automatable
- Yes
- Technical Impact
- total
- Exploited in the Wild
- Yes (2022-10-20 11:40:50 UTC) Source
CVSS Scores
CVSS v3.1
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
EPSS Score
SSVC Information
Exploit Status
References
Known Exploited Vulnerability Information
Source | Added Date |
---|---|
Wordfence | 2022-10-20 11:40:50 UTC |
Scanner Integrations
Scanner | URL | Date Detected |
---|---|---|
Metasploit | https://github.com/rapid7/metasploit-framework/blob/master/modules/exploits/multi/http/apache_commons_text4shell.rb | 2025-04-29 11:01:20 UTC |
Potential Proof of Concepts
Warning: These PoCs have not been tested and could contain malware. Use at your own risk.
apache_commons_text4shell
Type: metasploit • Created: Unknown
808ale/CVE-2022-42889-Text4Shell-POC
Type: github • Created: 2023-06-27 08:29:24 UTC • Stars: 14
sunnyvale-it/CVE-2022-42889-PoC
Type: github • Created: 2022-11-05 07:32:51 UTC • Stars: 2
cryxnet/CVE-2022-42889-RCE
Type: github • Created: 2022-11-04 19:26:23 UTC • Stars: 18
cxzero/CVE-2022-42889-text4shell
Type: github • Created: 2022-10-23 13:42:23 UTC • Stars: 21
0xmaximus/Apache-Commons-Text-CVE-2022-42889
Type: github • Created: 2022-10-23 08:33:02 UTC • Stars: 2
akshayithape-devops/CVE-2022-42889-POC
Type: github • Created: 2022-10-23 05:48:48 UTC • Stars: 6
s3l33/CVE-2022-42889
Type: github • Created: 2022-10-22 02:06:40 UTC • Stars: 3
humbss/CVE-2022-42889
Type: github • Created: 2022-10-21 13:48:04 UTC • Stars: 2
kljunowsky/CVE-2022-42889-text4shell
Type: github • Created: 2022-10-19 11:49:08 UTC • Stars: 55
korteke/CVE-2022-42889-POC
Type: github • Created: 2022-10-18 23:15:40 UTC • Stars: 13
SeanWrightSec/CVE-2022-42889-PoC
Type: github • Created: 2022-10-17 18:50:36 UTC • Stars: 34
Timeline
-
CVE ID Reserved
-
CVE Published to Public
-
Added to KEVIntel
-
Detected by Metasploit