18 Oct 2022 01:28 PM - last edited on 19 Jun 2023 09:38 AM by Karolina_Linda
Hi we received report about CVE-2022-42889: Apache Commons Text vulnerability, and are asked to investigate if this applies to Dynatrace environments we manage. Does this issue apply to Managed and SaaS environments?
CVE-2022-42889: Apache Commons Text vulnerability
CVE - CVE-2022-42889 (mitre.org)
Apache Commons Text performs variable interpolation, allowing properties to be dynamically evaluated and expanded. The standard format for interpolation is "${prefix:name}", where "prefix" is used to locate an instance of org.apache.commons.text.lookup.StringLookup that performs the interpolation. Starting with version 1.5 and continuing through 1.9, the set of default Lookup instances included interpolators that could result in arbitrary code execution or contact with remote servers. These lookups are: - "script" - execute expressions using the JVM script execution engine (javax.script) - "dns" - resolve dns records - "url" - load values from urls, including from remote servers Applications using the interpolation defaults in the affected versions may be vulnerable to remote code execution or unintentional contact with remote servers if untrusted configuration values are used. Users are recommended to upgrade to Apache Commons Text 1.10.0, which disables the problematic interpolators by default.
Solved! Go to Solution.
18 Oct 2022 10:03 PM
19 Oct 2022 07:59 AM
Hi @fstekelenburg,
Thanks for sharing this information.
Best regards,
Mizső
19 Oct 2022 08:56 AM
Hello everyone,
Here is a blog post from @Michael_Plank about the Apache Commons Text Vulnerability and its impact on the Dynatrace. All future updates will be published also on this page:
Apache Commons Text Vulnerability (CVE-2022-42889)