CVE Vulnerabilities

CVE-2022-33980

Published: Jul 06, 2022 | Modified: Dec 08, 2022
CVSS 3.x
9.8
CRITICAL
Source:
NVD
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
CVSS 2.x
7.5 HIGH
AV:N/AC:L/Au:N/C:P/I:P/A:P
RedHat/V2
RedHat/V3
7.5 MODERATE
CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
Ubuntu
MEDIUM

Apache Commons Configuration performs variable interpolation, allowing properties to be dynamically evaluated and expanded. The standard format for interpolation is ${prefix:name}, where prefix is used to locate an instance of org.apache.commons.configuration2.interpol.Lookup that performs the interpolation. Starting with version 2.4 and continuing through 2.7, the set of default Lookup instances included interpolators that could result in arbitrary code execution or contact with remote servers. These lookups are: - script - execute expressions using the JVM script execution engine (javax.script) - dns - resolve dns records - url - load values from urls, including from remote servers Applications using the interpolation defaults in the affected versions may be vulnerable to remote code execution or unintentional contact with remote servers if untrusted configuration values are used. Users are recommended to upgrade to Apache Commons Configuration 2.8.0, which disables the problematic interpolators by default.

Affected Software

Name Vendor Start Version End Version
Commons_configuration Apache 2.4 (including) 2.8 (excluding)
AMQ Broker 7.10.1 RedHat commons-configuration2 *
Red Hat Fuse 7.11.1 RedHat commons-configuration2 *
Red Hat Satellite 6.13 for RHEL 8 RedHat candlepin-0:4.2.13-1.el8sat *
Commons-configuration2 Ubuntu bionic *
Commons-configuration2 Ubuntu upstream *

References