Lucene search

K
atlassianCaronsonCWD-5892
HistoryNov 17, 2022 - 4:05 p.m.

Upgrade Apache Commons-text for CVE-2022-42889

2022-11-1716:05:18
caronson
jira.atlassian.com
29

9.8 High

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H

0.972 High

EPSS

Percentile

99.8%

h3. DISCLAIMER
{panel:bgColor=#e3fcef}
(!) Crowd {}IS NOT VULNERABLE to [CVE-2022-42889|https://vulners.com/cve/CVE-2022-42889]{}.

This bug was created to track the change required to upgrade the Apache Commons Text library and can be used by customers to follow its progress and get notified on the next numbered release.

Crowd does not use the vulnerable module {{org.apache.commons.text.StringSubstitutor}}
{panel}
h3. Issue Summary

Apache Common Text library should be upgraded to 1.10.0 or later to mitigate any exploiting attempts listed on [CVE-2022-42889|https://vulners.com/cve/CVE-2022-42889]
h3. Steps to Reproduce

Check <install-directory>/crowd-webapp/WEB-INF/lib/ for commons-text-X.X.jar
h3. Expected Results

apache-common-text 1.10.0+ is expected
h3. Actual Results

commons-text-1.9.jar (or earlier) is used
h3. Workaround

Currently there is no known workaround for this behavior. A workaround will be added here when available

Affected configurations

Vulners
Node
atlassiancrowdRange4.3.5
OR
atlassiancrowdRange5.0.0
OR
atlassiancrowdRange<4.4.5
OR
atlassiancrowdRange<5.1.2
OR
atlassiancrowdRange<5.0.5
OR
atlassiancrowdRange<4.3.11

9.8 High

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H

0.972 High

EPSS

Percentile

99.8%