CVE-2022-42889

CRITICAL EXPLOITED IN THE WILD NUCLEI LAB

Apache Commons Text < 1.10.0 - Code Injection

Title source: rule

Description

Apache Commons Text performs variable interpolation, allowing properties to be dynamically evaluated and expanded. The standard format for interpolation is "${prefix:name}", where "prefix" is used to locate an instance of org.apache.commons.text.lookup.StringLookup that performs the interpolation. Starting with version 1.5 and continuing through 1.9, the set of default Lookup instances included interpolators that could result in arbitrary code execution or contact with remote servers. These lookups are: - "script" - execute expressions using the JVM script execution engine (javax.script) - "dns" - resolve dns records - "url" - load values from urls, including from remote servers Applications using the interpolation defaults in the affected versions may be vulnerable to remote code execution or unintentional contact with remote servers if untrusted configuration values are used. Users are recommended to upgrade to Apache Commons Text 1.10.0, which disables the problematic interpolators by default.

Exploits (62)

exploitdb WORKING POC
by Arjun Chaudhary · pythonwebappsmultiple
https://www.exploit-db.com/exploits/52261
nomisec WORKING POC 76 stars
by karthikuj · remote
https://github.com/karthikuj/cve-2022-42889-text4shell-docker
nomisec WORKING POC 56 stars
by kljunowsky · remote
https://github.com/kljunowsky/CVE-2022-42889-text4shell
nomisec WORKING POC 39 stars
by ClickCyber · remote
https://github.com/ClickCyber/cve-2022-42889
nomisec WORKING POC 34 stars
by SeanWrightSec · remote
https://github.com/SeanWrightSec/CVE-2022-42889-PoC
nomisec WORKING POC 20 stars
by cxzero · remote
https://github.com/cxzero/CVE-2022-42889-text4shell
nomisec SCANNER 20 stars
by f0ng · poc
https://github.com/f0ng/text4shellburpscanner
nomisec WORKING POC 15 stars
by cryxnet · remote
https://github.com/cryxnet/CVE-2022-42889-RCE
nomisec WORKING POC 14 stars
by alealeluyah · poc
https://github.com/alealeluyah/CVE-2022-42889-Text4Shell-POC
nomisec WORKING POC 14 stars
by alebrestado · poc
https://github.com/alebrestado/CVE-2022-42889-Text4Shell-POC
nomisec WORKING POC 14 stars
by 808ale · remote
https://github.com/808ale/CVE-2022-42889-Text4Shell-POC
nomisec WORKING POC 10 stars
by korteke · remote
https://github.com/korteke/CVE-2022-42889-POC
nomisec WORKING POC 8 stars
by securekomodo · poc
https://github.com/securekomodo/text4shell-poc
nomisec WRITEUP 7 stars
by QAInsights · poc
https://github.com/QAInsights/cve-2022-42889-jmeter
nomisec WORKING POC 6 stars
by ifconfig-me · remote
https://github.com/ifconfig-me/Log4Shell-Payloads
nomisec WORKING POC 6 stars
by akshayithape-devops · remote
https://github.com/akshayithape-devops/CVE-2022-42889-POC
github WORKING POC 5 stars
by JAckLosingHeart · javapoc
https://github.com/JAckLosingHeart/CVE-PoC-Collection/tree/main/commons-text-CVE-2022-42889
nomisec WORKING POC 5 stars
by vickyaryan7 · poc
https://github.com/vickyaryan7/Text4shell-exploit
nomisec SCANNER 5 stars
by smileostrich · poc
https://github.com/smileostrich/Text4Shell-Scanner
nomisec SCANNER 4 stars
by chainguard-dev · poc
https://github.com/chainguard-dev/text4shell-policy
nomisec SCANNER 3 stars
by 0xmaximus · poc
https://github.com/0xmaximus/Apache-Commons-Text-CVE-2022-42889
nomisec WORKING POC 3 stars
by s3l33 · client-side
https://github.com/s3l33/CVE-2022-42889
nomisec WORKING POC 3 stars
by stavrosgns · remote
https://github.com/stavrosgns/Text4ShellPayloads
nomisec WORKING POC 3 stars
by uk0 · poc
https://github.com/uk0/cve-2022-42889-intercept
nomisec WORKING POC 2 stars
by devenes · remote
https://github.com/devenes/text4shell-cve-2022-42889
nomisec WORKING POC 2 stars
by sunnyvale-it · remote
https://github.com/sunnyvale-it/CVE-2022-42889-PoC
nomisec SCANNER 2 stars
by Gotcha1G · poc
https://github.com/Gotcha1G/CVE-2022-42889
nomisec NO CODE 2 stars
by Vulnmachines · poc
https://github.com/Vulnmachines/text4shell-CVE-2022-42889
nomisec WORKING POC 2 stars
by humbss · poc
https://github.com/humbss/CVE-2022-42889
nomisec WORKING POC 1 stars
by tulhan · poc
https://github.com/tulhan/commons-text-goat
nomisec WORKING POC 1 stars
by gokul-ramesh · remote
https://github.com/gokul-ramesh/text4shell-exploit
nomisec WORKING POC 1 stars
by rhitikwadhvana · remote
https://github.com/rhitikwadhvana/CVE-2022-42889-Text4Shell-Exploit-POC
nomisec WRITEUP
by KosmicOwl045 · poc
https://github.com/KosmicOwl045/ICT287-CVE-2022-42889
nomisec WRITEUP
by sangrok-jeon · poc
https://github.com/sangrok-jeon/CVE-2022-42889-Analysis
nomisec WRITEUP
by engranaabubakar · poc
https://github.com/engranaabubakar/CVE-2022-42889
gitlab WORKING POC
by ndanhdien98 · remote
https://gitlab.com/ndanhdien98/text4shell-poc
gitlab WORKING POC
by korteke · remote
https://gitlab.com/korteke/CVE-2022-42889-POC
nomisec WORKING POC
by DimaMend · remote
https://github.com/DimaMend/cve-2022-42889-text4shell
nomisec WORKING POC
by Goultarde · remote
https://github.com/Goultarde/CVE-2022-42889-text4shell
nomisec WORKING POC
by MendDemo-josh · remote
https://github.com/MendDemo-josh/cve-2022-42889-text4shell
nomisec WORKING POC
by ReachabilityOrg · remote
https://github.com/ReachabilityOrg/cve-2022-42889-text4shell-docker
nomisec WORKING POC
by shoucheng3 · poc
https://github.com/shoucheng3/asf__commons-text_CVE-2022-42889_1-9
nomisec WORKING POC
by Syndicate27 · poc
https://github.com/Syndicate27/text4shell-exploit
nomisec WORKING POC
by joshbnewton31080 · remote
https://github.com/joshbnewton31080/cve-2022-42889-text4shell
nomisec WORKING POC
by aaronm-sysdig · remote
https://github.com/aaronm-sysdig/text4shell-docker
nomisec WORKING POC
by 34006133 · remote
https://github.com/34006133/CVE-2022-42889
nomisec WORKING POC
by Sic4rio · remote
https://github.com/Sic4rio/CVE-2022-42889
nomisec WORKING POC
by necroteddy · remote
https://github.com/necroteddy/CVE-2022-42889
nomisec WORKING POC
by Dima2021 · remote
https://github.com/Dima2021/cve-2022-42889-text4shell
nomisec WORKING POC
by hotblac · poc
https://github.com/hotblac/text4shell
nomisec WORKING POC
by adarshpv9746 · remote
https://github.com/adarshpv9746/Text4shell--Automated-exploit---CVE-2022-42889
nomisec WORKING POC
by galoget · poc
https://github.com/galoget/CVE-2022-42889-Text4Shell-Docker
nomisec STUB
by eunomie · poc
https://github.com/eunomie/cve-2022-42889-check
nomisec WORKING POC
by neerazz · remote
https://github.com/neerazz/CVE-2022-42889
nomisec SCANNER
by kiralab · poc
https://github.com/kiralab/text4shell-scan
nomisec WORKING POC
by rockmelodies · poc
https://github.com/rockmelodies/CVE-2022-42889
vulncheck_xdb WORKING POC
remote
https://github.com/junius-sec/kr-vulhub
vulncheck_xdb WORKING POC
remote
https://github.com/joseluisinigo/riskootext4shell
vulncheck_xdb WORKING POC
remote-auth
https://github.com/pwnb0y/Text4shell-exploit
metasploit WORKING POC EXCELLENT
by Alvaro Muñoz, Karthik UJ, Gaurav Jain · rubypocjava
https://github.com/rapid7/metasploit-framework/blob/master/modules/exploits/multi/http/apache_commons_text4shell.rb

Nuclei Templates (1)

Text4Shell - Remote Code Execution
CRITICALby mordavid,princechaddha

Scores

CVSS v3 9.8
EPSS 0.9425
EPSS Percentile 99.9%
Attack Vector NETWORK
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H

Lab Environment

COMMUNITY
Community Lab
docker pull cgr.dev/chainguard/jdk@sha256:d8f435ffab139985ab2d505031c8507fc25eedbae0f91bc71edc1914029263da
docker pull eclipse-temurin:18
+52 more repos

Details

VulnCheck KEV 2023-01-12
InTheWild.io 2023-01-12
CWE
CWE-94
Status published
Products (6)
apache/commons_text 1.5 - 1.10.0
com.guicedee.services/commons-text 0Maven
juniper/security_threat_response_manager 7.5.0 (4 CPE variants)
juniper/security_threat_response_manager < 7.5.0
netapp/bluexp
org.apache.commons/commons-text 1.5 - 1.10.0Maven
Published Oct 13, 2022
Tracked Since Feb 18, 2026