cancel
Showing results for 
Show  only  | Search instead for 
Did you mean: 

CVE-2022-42889: Apache Commons Text vulnerability

fstekelenburg
DynaMight Pro
DynaMight Pro

Hi we received report about CVE-2022-42889: Apache Commons Text vulnerability, and are asked to investigate if this applies to Dynatrace environments we manage. Does this issue apply to Managed and SaaS environments?

CVE-2022-42889: Apache Commons Text vulnerability
CVE - CVE-2022-42889 (mitre.org)

Apache Commons Text performs variable interpolation, allowing properties to be dynamically evaluated and expanded. The standard format for interpolation is "${prefix:name}", where "prefix" is used to locate an instance of org.apache.commons.text.lookup.StringLookup that performs the interpolation. Starting with version 1.5 and continuing through 1.9, the set of default Lookup instances included interpolators that could result in arbitrary code execution or contact with remote servers. These lookups are: - "script" - execute expressions using the JVM script execution engine (javax.script) - "dns" - resolve dns records - "url" - load values from urls, including from remote servers Applications using the interpolation defaults in the affected versions may be vulnerable to remote code execution or unintentional contact with remote servers if untrusted configuration values are used. Users are recommended to upgrade to Apache Commons Text 1.10.0, which disables the problematic interpolators by default.

Kind regards, Frans Stekelenburg                 Certified Dynatrace Associate | measure.works, Dynatrace Partner
3 REPLIES 3

fstekelenburg
DynaMight Pro
DynaMight Pro

New critical vulnerability, CVE-2022-42889, in Apache Commons Text discovered (but no need to panic)...

Kind regards, Frans Stekelenburg                 Certified Dynatrace Associate | measure.works, Dynatrace Partner

Mizső
DynaMight Guru
DynaMight Guru

Hi @fstekelenburg,

 

Thanks for sharing this information.

 

Best regards,

 

Mizső

Dynatrace Community RockStar 2024, Certified Dynatrace Professional

MaciejNeumann
Community Team
Community Team

Hello everyone,

 

Here is a blog post from @Michael_Plank about the Apache Commons Text Vulnerability and its impact on the Dynatrace. All future updates will be published also on this page:

 

Apache Commons Text Vulnerability (CVE-2022-42889) 

If you have any questions about the Community, you can contact me at maciej.neumann@dynatrace.com

Featured Posts