Company
Date Published
Author
Robin Wyss
Word count
610
Language
American English
Hacker News points
None

Summary

A high-severity remote code execution (RCE) vulnerability, known as CVE-2022-42889 or Text4Shell, was disclosed on October 13, 2022, affecting the Apache Commons Text library, which provides text processing functions. Although some perceive it as the successor to Log4Shell, its impact is considered less severe because it is harder to exploit and not as widespread. The vulnerability impacts versions 1.5 to 1.9 of the library but has been addressed in version 1.10.0. Organizations are advised to upgrade to this latest version to mitigate risks. Various tools and strategies can be employed to detect if an organization is affected, including Dynatrace Application Security and the Maven dependency tree. The vulnerability allows for execution of expressions, DNS resolution, and loading values from remote servers through string interpolation, which makes certain features like "script," "dns," and "url" potentially exploitable. Despite its high NVD severity rating of 9.8, other agencies have rated it as less severe due to its limited adoption and exploitation difficulty.