Lucene search

K
broadcomBroadcom Security ResponseBSNSA22448
HistoryAug 29, 2023 - 12:00 a.m.

Apache Commons Configuration performs variable interpolation, allowing properties to be dynamically evaluated and expanded.

2023-08-2900:00:00
Broadcom Security Response
support.broadcom.com
21
apache commons configuration
variable interpolation
vulnerability fix
remote code execution
upgrade

AI Score

8.7

Confidence

Low

EPSS

0.215

Percentile

96.5%

Apache Commons Configuration performs variable interpolation, allowing properties to be dynamically evaluated and expanded. The standard format for interpolation is โ€œ${prefix:name}โ€, where โ€œprefixโ€ is used to locate an instance of org.apache.commons.configuration2.interpol.Lookup that performs the interpolation. Starting with version 2.4 and continuing through 2.7, the set of default Lookup instances included interpolators that could result in arbitrary code execution or contact with remote servers. These lookups are: - โ€œscriptโ€ - execute expressions using the JVM script execution engine (javax.script) - โ€œdnsโ€ - resolve dns records - โ€œurlโ€ - load values from urls, including from remote servers Applications using the interpolation defaults in the affected versions may be vulnerable to remote code execution or unintentional contact with remote servers if untrusted configuration values are used. Users are recommended to upgrade to Apache Commons Configuration 2.8.0, which disables the problematic interpolators by default.

Products Confirmed Not Affected

No Brocade Fibre Channel products are affected by this vulnerability