CVE-2022-42889:
Arbitrary code execution in Apache Commons Text
9.8
CVSS ScoreBasic Information
CVE ID
GHSA ID
EPSS Score
-
CWE
Published
10/13/2022
Updated
1/19/2024
KEV Status
No
Technology
Java
Technical Details
CVSS Vector
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
Package Name | Ecosystem | Vulnerable Versions | First Patched Version |
---|---|---|---|
org.apache.commons:commons-text | maven | >= 1.5, < 1.10.0 | 1.10.0 |
com.guicedee.services:commons-text | maven | <= 1.2.2.1-jre17 |
Vulnerability Intelligence
Miggo AI
Root Cause Analysis
The analysis is based on the descriptions provided, highlighting the role of StringSubstitutor and its methods in the vulnerability. The methods replace and replaceIn are directly implicated in processing potentially malicious input, making them the primary vulnerable functions. The createInterpolator method is also relevant as it sets up the interpolator with default lookups that include the vulnerable ones.