<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: CVE-2022-42889: Apache Commons Text vulnerability in Open Q&amp;A</title>
    <link>https://community.dynatrace.com/t5/Open-Q-A/CVE-2022-42889-Apache-Commons-Text-vulnerability/m-p/196768#M22959</link>
    <description>&lt;P&gt;Hi&amp;nbsp;&lt;a href="https://community.dynatrace.com/t5/user/viewprofilepage/user-id/21639"&gt;@fstekelenburg&lt;/a&gt;,&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Thanks for sharing this information.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Best regards,&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Mizső&lt;/P&gt;</description>
    <pubDate>Wed, 19 Oct 2022 06:59:23 GMT</pubDate>
    <dc:creator>Mizső</dc:creator>
    <dc:date>2022-10-19T06:59:23Z</dc:date>
    <item>
      <title>CVE-2022-42889: Apache Commons Text vulnerability</title>
      <link>https://community.dynatrace.com/t5/Open-Q-A/CVE-2022-42889-Apache-Commons-Text-vulnerability/m-p/196711#M22950</link>
      <description>&lt;P&gt;Hi we received report about&amp;nbsp;CVE-2022-42889: Apache Commons Text vulnerability, and are asked to investigate if this applies to Dynatrace environments we manage. Does this issue apply to Managed and SaaS environments?&lt;BR /&gt;&lt;BR /&gt;CVE-2022-42889: Apache Commons Text vulnerability&lt;BR /&gt;&lt;A href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42889" target="_blank" rel="noopener"&gt;CVE - CVE-2022-42889 (mitre.org)&lt;/A&gt;&lt;BR /&gt;&lt;BR /&gt;&lt;FONT size="2"&gt;&lt;EM&gt;Apache Commons Text performs variable interpolation, allowing properties to be dynamically evaluated and expanded. The standard format for interpolation is "${prefix:name}", where "prefix" is used to locate an instance of org.apache.commons.text.lookup.StringLookup that performs the interpolation. Starting with version 1.5 and continuing through 1.9, the set of default Lookup instances included interpolators that could result in arbitrary code execution or contact with remote servers. These lookups are: - "script" - execute expressions using the JVM script execution engine (javax.script) - "dns" - resolve dns records - "url" - load values from urls, including from remote servers Applications using the interpolation defaults in the affected versions may be vulnerable to remote code execution or unintentional contact with remote servers if untrusted configuration values are used. Users are recommended to upgrade to Apache Commons Text 1.10.0, which disables the problematic interpolators by default.&lt;/EM&gt;&lt;/FONT&gt;&lt;BR /&gt;&lt;BR /&gt;&lt;/P&gt;</description>
      <pubDate>Mon, 19 Jun 2023 08:38:25 GMT</pubDate>
      <guid>https://community.dynatrace.com/t5/Open-Q-A/CVE-2022-42889-Apache-Commons-Text-vulnerability/m-p/196711#M22950</guid>
      <dc:creator>fstekelenburg</dc:creator>
      <dc:date>2023-06-19T08:38:25Z</dc:date>
    </item>
    <item>
      <title>Re: CVE-2022-42889: Apache Commons Text vulnerability</title>
      <link>https://community.dynatrace.com/t5/Open-Q-A/CVE-2022-42889-Apache-Commons-Text-vulnerability/m-p/196762#M22958</link>
      <description>&lt;P&gt;&lt;A href="https://www.dynatrace.com/news/blog/new-critical-vulnerability-cve-2022-42889-in-apache-commons-text-discovered-but-no-need-to-panic/?utm_medium=social&amp;amp;utm_source=linkedin&amp;amp;utm_campaign=cve2022.42889apache&amp;amp;utm_content=blog&amp;amp;utm_term=none" target="_blank"&gt;New critical vulnerability, CVE-2022-42889, in Apache Commons Text discovered (but no need to panic) | Dynatrace news&lt;/A&gt;&lt;/P&gt;</description>
      <pubDate>Tue, 18 Oct 2022 21:03:17 GMT</pubDate>
      <guid>https://community.dynatrace.com/t5/Open-Q-A/CVE-2022-42889-Apache-Commons-Text-vulnerability/m-p/196762#M22958</guid>
      <dc:creator>fstekelenburg</dc:creator>
      <dc:date>2022-10-18T21:03:17Z</dc:date>
    </item>
    <item>
      <title>Re: CVE-2022-42889: Apache Commons Text vulnerability</title>
      <link>https://community.dynatrace.com/t5/Open-Q-A/CVE-2022-42889-Apache-Commons-Text-vulnerability/m-p/196768#M22959</link>
      <description>&lt;P&gt;Hi&amp;nbsp;&lt;a href="https://community.dynatrace.com/t5/user/viewprofilepage/user-id/21639"&gt;@fstekelenburg&lt;/a&gt;,&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Thanks for sharing this information.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Best regards,&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Mizső&lt;/P&gt;</description>
      <pubDate>Wed, 19 Oct 2022 06:59:23 GMT</pubDate>
      <guid>https://community.dynatrace.com/t5/Open-Q-A/CVE-2022-42889-Apache-Commons-Text-vulnerability/m-p/196768#M22959</guid>
      <dc:creator>Mizső</dc:creator>
      <dc:date>2022-10-19T06:59:23Z</dc:date>
    </item>
    <item>
      <title>Re: CVE-2022-42889: Apache Commons Text vulnerability</title>
      <link>https://community.dynatrace.com/t5/Open-Q-A/CVE-2022-42889-Apache-Commons-Text-vulnerability/m-p/196774#M22963</link>
      <description>&lt;P&gt;Hello everyone,&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Here is a blog post from&amp;nbsp;&lt;a href="https://community.dynatrace.com/t5/user/viewprofilepage/user-id/7380"&gt;@Michael_Plank&lt;/a&gt;&amp;nbsp;about the&amp;nbsp;Apache Commons Text Vulnerability and its impact on the Dynatrace. All future updates will be published also on this page:&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;A href="https://www.dynatrace.com/news/security-alert/apache-commons-text-vulnerability-cve-2022-42889/" target="_self"&gt;Apache Commons Text Vulnerability (CVE-2022-42889)&lt;/A&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Wed, 19 Oct 2022 07:56:27 GMT</pubDate>
      <guid>https://community.dynatrace.com/t5/Open-Q-A/CVE-2022-42889-Apache-Commons-Text-vulnerability/m-p/196774#M22963</guid>
      <dc:creator>MaciejNeumann</dc:creator>
      <dc:date>2022-10-19T07:56:27Z</dc:date>
    </item>
  </channel>
</rss>

