Lucene search

K
cveApacheCVE-2022-33980
HistoryJul 06, 2022 - 1:15 p.m.

CVE-2022-33980

2022-07-0613:15:09
apache
web.nvd.nist.gov
352
5
cve
apache commons configuration
remote code execution
interpolation
nvd
security vulnerability

CVSS2

7.5

Attack Vector

NETWORK

Attack Complexity

LOW

Authentication

NONE

Confidentiality Impact

PARTIAL

Integrity Impact

PARTIAL

Availability Impact

PARTIAL

AV:N/AC:L/Au:N/C:P/I:P/A:P

CVSS3

9.8

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H

AI Score

9.7

Confidence

High

EPSS

0.215

Percentile

96.5%

Apache Commons Configuration performs variable interpolation, allowing properties to be dynamically evaluated and expanded. The standard format for interpolation is โ€œ${prefix:name}โ€, where โ€œprefixโ€ is used to locate an instance of org.apache.commons.configuration2.interpol.Lookup that performs the interpolation. Starting with version 2.4 and continuing through 2.7, the set of default Lookup instances included interpolators that could result in arbitrary code execution or contact with remote servers. These lookups are: - โ€œscriptโ€ - execute expressions using the JVM script execution engine (javax.script) - โ€œdnsโ€ - resolve dns records - โ€œurlโ€ - load values from urls, including from remote servers Applications using the interpolation defaults in the affected versions may be vulnerable to remote code execution or unintentional contact with remote servers if untrusted configuration values are used. Users are recommended to upgrade to Apache Commons Configuration 2.8.0, which disables the problematic interpolators by default.

Affected configurations

Nvd
Vulners
Node
apachecommons_configurationRange2.4โ€“2.8
Node
netappsnapcenterMatch-
Node
debiandebian_linuxMatch11.0
VendorProductVersionCPE
apachecommons_configuration*cpe:2.3:a:apache:commons_configuration:*:*:*:*:*:*:*:*
netappsnapcenter-cpe:2.3:a:netapp:snapcenter:-:*:*:*:*:*:*:*
debiandebian_linux11.0cpe:2.3:o:debian:debian_linux:11.0:*:*:*:*:*:*:*

CNA Affected

[
  {
    "vendor": "Apache Software Foundation",
    "product": "Apache Commons Configuration",
    "versions": [
      {
        "version": "Apache Commons Configuration",
        "status": "affected",
        "lessThan": "2.8.0",
        "versionType": "custom",
        "changes": [
          {
            "at": "2.4",
            "status": "affected"
          }
        ]
      }
    ]
  }
]

Social References

More

CVSS2

7.5

Attack Vector

NETWORK

Attack Complexity

LOW

Authentication

NONE

Confidentiality Impact

PARTIAL

Integrity Impact

PARTIAL

Availability Impact

PARTIAL

AV:N/AC:L/Au:N/C:P/I:P/A:P

CVSS3

9.8

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H

AI Score

9.7

Confidence

High

EPSS

0.215

Percentile

96.5%