⚠ Exploited in the wild
Exploitation observed in the wild. Not yet on CISA KEV.
CVE-2022-42889 — Text4Shell: Code Injection in Apache Commons Text
Severity
9.8CRITICALNVD
EPSS
94.3%
top 0.07%
CISA KEV
Not in KEV
Exploit
Exploited in wild
Active exploitation observed
Affected products
Timeline
PublishedOct 13
Latest updateApr 18
Description
Apache Commons Text performs variable interpolation, allowing properties to be dynamically evaluated and expanded. The standard format for interpolation is "${prefix:name}", where "prefix" is used to locate an instance of org.apache.commons.text.lookup.StringLookup that performs the interpolation. Starting with version 1.5 and continuing through 1.9, the set of default Lookup instances included interpolators that could result in arbitrary code execution or contact with remote servers. These look…
CVSS vector
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:HExploitability: 3.9 | Impact: 5.9
Affected Packages12 packages
🔴Vulnerability Details
5💥Exploits & PoCs
2Nuclei▶
Text4Shell - Remote Code Execution
🔍Detection Rules
8Suricata
▶
Suricata▶
ET EXPLOIT Possible Apache Text4shell RCE Attempt Script Prefix (CVE-2022-42889) (Outbound)↗2022-10-19
Suricata
▶
Suricata
▶
Suricata
▶
📋Vendor Advisories
6Oracle▶
Oracle Oracle HealthCare Applications Risk Matrix: FHIR (Apache Commons Text) — CVE-2022-42889↗2024-04-15
Oracle▶
Oracle Oracle Financial Services Applications Risk Matrix: Application (Apache Commons Text) — CVE-2022-42889↗2023-04-15
Oracle▶
Oracle Oracle Communications Applications Risk Matrix: PSR Designer (Apache Commons Text) — CVE-2022-42889↗2023-01-15