Bug 2135435 (CVE-2022-42889)
Summary: | CVE-2022-42889 apache-commons-text: variable interpolation RCE | ||
---|---|---|---|
Product: | [Other] Security Response | Reporter: | Chess Hazlett <chazlett> |
Component: | vulnerability | Assignee: | Red Hat Product Security <security-response-team> |
Status: | CLOSED ERRATA | QA Contact: | |
Severity: | urgent | Docs Contact: | |
Priority: | urgent | ||
Version: | unspecified | CC: | abenaiss, aboyko, aganbat, agogala, aileenc, alazarot, anstephe, asoldano, ataylor, avibelli, balejosg, bbaranow, bbuckingham, bcourt, bgeorges, bishop, bmaxwell, boliveir, boris.m, brian.stansberry, btotty, cdewolf, chazlett, clement.escoffier, cmoulliard, csutherl, dandread, darran.lofthouse, dkreling, dosoudil, ehelms, emingora, eric.wittmann, etirelli, fjuma, fmongiar, gjospin, gmalinko, gmorling, gsmet, hamadhan, ibek, ikanello, iweiss, jangerrit.kootstra, janstey, jburrell, jcantril, jclere, jnethert, jniu, jnoh, jochrist, jpavlik, jpechane, jpoth, jrokos, jross, jscholz, jsherril, jstastny, juholmes, jwon, kaycoth, Ken.Fowler, krathod, kverlaen, kyoshida, lgao, lthon, lzap, mhulan, mmadzin, mmccune, mmclaugh, mnovotny, mokumar, mosmerov, msochure, msvehla, myarboro, nmoumoul, nwallace, orabin, pantinor, pcreech, pdelbell, pdrozd, peholase, periklis, pgallagh, pjindal, pmackay, probinso, proguski, pskopek, rbeyel, rchan, rdey, rgodfrey, rguimara, rkieley, rrajasek, rruss, rstancel, rsvoboda, sbalasub, sbiarozk, sdouglas, sfowler, smaestri, sthorger, szappis, tcunning, tom.jenkinson, vkumar, yfang |
Target Milestone: | --- | Keywords: | Reopened, Security |
Target Release: | --- | ||
Hardware: | All | ||
OS: | Linux | ||
Whiteboard: | |||
Fixed In Version: | commons-text 1.10.0 | Doc Type: | If docs needed, set a value |
Doc Text: |
A flaw was found in Apache Commons Text packages 1.5 through 1.9. The affected versions allow an attacker to benefit from a variable interpolation process contained in Apache Commons Text, which can cause properties to be dynamically defined. Server applications are vulnerable to remote code execution (RCE) and unintentional contact with untrusted remote servers.
|
Story Points: | --- |
Clone Of: | Environment: | ||
Last Closed: | 2022-12-10 20:33:05 UTC | Type: | --- |
Regression: | --- | Mount Type: | --- |
Documentation: | --- | CRM: | |
Verified Versions: | Category: | --- | |
oVirt Team: | --- | RHEL 7.3 requirements from Atomic Host: | |
Cloudforms Team: | --- | Target Upstream Version: | |
Embargoed: | |||
Bug Depends On: | 2135924, 2135926, 2150122, 2159406 | ||
Bug Blocks: | 2135067 |
Description
Chess Hazlett
2022-10-17 16:23:22 UTC
Statement: eap-7, eapxp-4, camel-k, camel-q have maven references to the affected package but does not ship it nor use the code After further evaluation, we found that EAP has apache-commons-text dependency explicitly declared under exclusions : https://github.com/jbossas/jboss-eap7/blob/EAP_7.4.7.CR3-dev/pom.xml Hence marking EAP as not affected and closing the EAP tracker. adding openshift-4 and satellite-6 affected/fix Is there any mitigation for this vulnerability? Any updates planned for Satellite Server 6 to fix this vulnerability? business-central.war/WEB-INF/lib/commons-text-1.9.jar exists in Redhat process automation service. Any updates planned for RHPAM 7.13.1? This issue has been addressed in the following products: Red Hat Fuse 7.11.1 Via RHSA-2022:8652 https://access.redhat.com/errata/RHSA-2022:8652 This issue has been addressed in the following products: Red Hat JBoss AMQ Via RHSA-2022:8876 https://access.redhat.com/errata/RHSA-2022:8876 This issue has been addressed in the following products: RHINT Camel-Springboot 3.18.3 Via RHSA-2022:8902 https://access.redhat.com/errata/RHSA-2022:8902 This bug is now closed. Further updates for individual products will be reflected on the CVE page(s): https://access.redhat.com/security/cve/cve-2022-42889 This issue has been addressed in the following products: Red Hat build of Quarkus 2.13.5 Via RHSA-2022:9023 https://access.redhat.com/errata/RHSA-2022:9023 Could you provide status updates on Red Hat Satellite 6 **candlepin**? Thank you! This issue has been addressed in the following products: Red Hat Satellite 6.12 for RHEL 8 Via RHSA-2023:0261 https://access.redhat.com/errata/RHSA-2023:0261 This issue has been addressed in the following products: RHINT Camel-Q 2.13.2 Via RHSA-2023:0469 https://access.redhat.com/errata/RHSA-2023:0469 This issue has been addressed in the following products: Red Hat build of Quarkus 2.7.7 Via RHSA-2023:1006 https://access.redhat.com/errata/RHSA-2023:1006 This issue has been addressed in the following products: Red Hat OpenShift Container Platform 4.9 Via RHSA-2023:1524 https://access.redhat.com/errata/RHSA-2023:1524 This issue has been addressed in the following products: Red Hat OpenShift Container Platform 4.10 Via RHSA-2023:1655 https://access.redhat.com/errata/RHSA-2023:1655 This issue has been addressed in the following products: Red Hat OpenShift Container Platform 4.10 Via RHSA-2023:1866 https://access.redhat.com/errata/RHSA-2023:1866 This issue has been addressed in the following products: Red Hat Satellite 6.13 for RHEL 8 Via RHSA-2023:2097 https://access.redhat.com/errata/RHSA-2023:2097 This issue has been addressed in the following products: Red Hat Process Automation Via RHSA-2023:2135 https://access.redhat.com/errata/RHSA-2023:2135 This issue has been addressed in the following products: OpenShift Developer Tools and Services for OCP 4.12 Via RHSA-2023:3195 https://access.redhat.com/errata/RHSA-2023:3195 This issue has been addressed in the following products: OpenShift Developer Tools and Services for OCP 4.11 Via RHSA-2023:3198 https://access.redhat.com/errata/RHSA-2023:3198 This issue has been addressed in the following products: OpenShift Developer Tools and Services for OCP 4.13 Via RHSA-2023:3299 https://access.redhat.com/errata/RHSA-2023:3299 This issue has been addressed in the following products: OpenShift Developer Tools and Services for OCP 4.13 Via RHSA-2023:6179 https://access.redhat.com/errata/RHSA-2023:6179 This issue has been addressed in the following products: OpenShift Developer Tools and Services for OCP 4.14 Via RHSA-2023:7288 https://access.redhat.com/errata/RHSA-2023:7288 This issue has been addressed in the following products: OpenShift Developer Tools and Services for OCP 4.13 Via RHSA-2024:0776 https://access.redhat.com/errata/RHSA-2024:0776 This issue has been addressed in the following products: OpenShift Developer Tools and Services for OCP 4.14 Via RHSA-2024:0777 https://access.redhat.com/errata/RHSA-2024:0777 This issue has been addressed in the following products: OpenShift Developer Tools and Services for OCP 4.12 Via RHSA-2024:0778 https://access.redhat.com/errata/RHSA-2024:0778 This issue has been addressed in the following products: OpenShift Developer Tools and Services for OCP 4.11 Via RHSA-2024:0775 https://access.redhat.com/errata/RHSA-2024:0775 This issue has been addressed in the following products: Red Hat AMQ Streams 2.7.0 Via RHSA-2024:3527 https://access.redhat.com/errata/RHSA-2024:3527 This issue has been addressed in the following products: Red Hat JBoss Enterprise Application Platform 7.1 EUS for RHEL 7 Via RHSA-2025:1746 https://access.redhat.com/errata/RHSA-2025:1746 This issue has been addressed in the following products: Red Hat JBoss Enterprise Application Platform 7.3 EUS for RHEL 7 Via RHSA-2025:1747 https://access.redhat.com/errata/RHSA-2025:1747 |