Miggo Logo

CVE-2022-42889:
Arbitrary code execution in Apache Commons Text

9.8

CVSS Score

Basic Information

EPSS Score
-
Published
10/13/2022
Updated
1/19/2024
KEV Status
No
Technology
TechnologyJava

Technical Details

CVSS Vector
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
Package NameEcosystemVulnerable VersionsFirst Patched Version
org.apache.commons:commons-textmaven>= 1.5, < 1.10.01.10.0
com.guicedee.services:commons-textmaven<= 1.2.2.1-jre17

Vulnerability Intelligence
Miggo AIMiggo AI

Miggo AIRoot Cause Analysis

The analysis is based on the descriptions provided, highlighting the role of StringSubstitutor and its methods in the vulnerability. The methods replace and replaceIn are directly implicated in processing potentially malicious input, making them the primary vulnerable functions. The createInterpolator method is also relevant as it sets up the interpolator with default lookups that include the vulnerable ones.

Vulnerable functions

Only Mi**o us*rs **n s** t*is s**tion

WAF Protection Rules

WAF Rule

*p**** *ommons T*xt p*r*orms v*ri**l* int*rpol*tion, *llowin* prop*rti*s to ** *yn*mi**lly *v*lu*t** *n* *xp*n***. T** st*n**r* *orm*t *or int*rpol*tion is "${pr**ix:n*m*}", w**r* "pr**ix" is us** to lo**t* *n inst*n** o* or*.*p****.*ommons.t*xt.look

Reasoning

T** *n*lysis is **s** on t** **s*riptions provi***, *i**li**tin* t** rol* o* Strin*Su*stitutor *n* its m*t*o*s in t** vuln*r**ility. T** m*t*o*s r*pl*** *n* r*pl***In *r* *ir**tly impli**t** in pro**ssin* pot*nti*lly m*li*ious input, m*kin* t**m t**