CVE-2022-42889

CRITICAL EXPLOITED IN THE WILD NUCLEI

Apache Commons Text < 1.10.0 - Code Injection

Title source: rule

Description

Apache Commons Text performs variable interpolation, allowing properties to be dynamically evaluated and expanded. The standard format for interpolation is "${prefix:name}", where "prefix" is used to locate an instance of org.apache.commons.text.lookup.StringLookup that performs the interpolation. Starting with version 1.5 and continuing through 1.9, the set of default Lookup instances included interpolators that could result in arbitrary code execution or contact with remote servers. These lookups are: - "script" - execute expressions using the JVM script execution engine (javax.script) - "dns" - resolve dns records - "url" - load values from urls, including from remote servers Applications using the interpolation defaults in the affected versions may be vulnerable to remote code execution or unintentional contact with remote servers if untrusted configuration values are used. Users are recommended to upgrade to Apache Commons Text 1.10.0, which disables the problematic interpolators by default.

Exploits (57)

nomisec WORKING POC 76 stars
by karthikuj · remote
https://github.com/karthikuj/cve-2022-42889-text4shell-docker
nomisec WORKING POC 56 stars
by kljunowsky · remote
https://github.com/kljunowsky/CVE-2022-42889-text4shell
nomisec WORKING POC 39 stars
by ClickCyber · remote
https://github.com/ClickCyber/cve-2022-42889
nomisec WORKING POC 34 stars
by SeanWrightSec · remote
https://github.com/SeanWrightSec/CVE-2022-42889-PoC
nomisec SCANNER 20 stars
by f0ng · poc
https://github.com/f0ng/text4shellburpscanner
nomisec WORKING POC 20 stars
by cxzero · remote
https://github.com/cxzero/CVE-2022-42889-text4shell
nomisec WORKING POC 15 stars
by cryxnet · remote
https://github.com/cryxnet/CVE-2022-42889-RCE
nomisec WORKING POC 14 stars
by 808ale · remote
https://github.com/808ale/CVE-2022-42889-Text4Shell-POC
nomisec WORKING POC 10 stars
by korteke · remote
https://github.com/korteke/CVE-2022-42889-POC
nomisec WORKING POC 8 stars
by securekomodo · poc
https://github.com/securekomodo/text4shell-poc
nomisec WRITEUP 7 stars
by QAInsights · poc
https://github.com/QAInsights/cve-2022-42889-jmeter
nomisec WORKING POC 6 stars
by akshayithape-devops · remote
https://github.com/akshayithape-devops/CVE-2022-42889-POC
nomisec WORKING POC 6 stars
by ifconfig-me · remote
https://github.com/ifconfig-me/Log4Shell-Payloads
github WORKING POC 5 stars
by JAckLosingHeart · javapoc
https://github.com/JAckLosingHeart/CVE-PoC-Collection/tree/main/commons-text-CVE-2022-42889
nomisec SCANNER 5 stars
by smileostrich · poc
https://github.com/smileostrich/Text4Shell-Scanner
nomisec WORKING POC 5 stars
by vickyaryan7 · poc
https://github.com/vickyaryan7/Text4shell-exploit
nomisec SCANNER 4 stars
by chainguard-dev · poc
https://github.com/chainguard-dev/text4shell-policy
nomisec SCANNER 3 stars
by 0xmaximus · poc
https://github.com/0xmaximus/Apache-Commons-Text-CVE-2022-42889
nomisec WORKING POC 3 stars
by stavrosgns · remote
https://github.com/stavrosgns/Text4ShellPayloads
nomisec WORKING POC 3 stars
by s3l33 · client-side
https://github.com/s3l33/CVE-2022-42889
nomisec WORKING POC 3 stars
by uk0 · poc
https://github.com/uk0/cve-2022-42889-intercept
nomisec WORKING POC 2 stars
by sunnyvale-it · remote
https://github.com/sunnyvale-it/CVE-2022-42889-PoC
nomisec WORKING POC 2 stars
by devenes · remote
https://github.com/devenes/text4shell-cve-2022-42889
nomisec SCANNER 2 stars
by Gotcha1G · poc
https://github.com/Gotcha1G/CVE-2022-42889
nomisec NO CODE 2 stars
by Vulnmachines · poc
https://github.com/Vulnmachines/text4shell-CVE-2022-42889
nomisec WORKING POC 2 stars
by humbss · poc
https://github.com/humbss/CVE-2022-42889
nomisec WORKING POC 1 stars
by gokul-ramesh · remote
https://github.com/gokul-ramesh/text4shell-exploit
nomisec WORKING POC 1 stars
by rhitikwadhvana · remote
https://github.com/rhitikwadhvana/CVE-2022-42889-Text4Shell-Exploit-POC
nomisec WORKING POC 1 stars
by tulhan · poc
https://github.com/tulhan/commons-text-goat
nomisec SCANNER
by kiralab · poc
https://github.com/kiralab/text4shell-scan
gitlab WORKING POC
by korteke · remote
https://gitlab.com/korteke/CVE-2022-42889-POC
nomisec WORKING POC
by necroteddy · remote
https://github.com/necroteddy/CVE-2022-42889
nomisec WORKING POC
by ReachabilityOrg · remote
https://github.com/ReachabilityOrg/cve-2022-42889-text4shell-docker
nomisec WORKING POC
by Syndicate27 · poc
https://github.com/Syndicate27/text4shell-exploit
nomisec WORKING POC
by adarshpv9746 · remote
https://github.com/adarshpv9746/Text4shell--Automated-exploit---CVE-2022-42889
nomisec WORKING POC
by shoucheng3 · poc
https://github.com/shoucheng3/asf__commons-text_CVE-2022-42889_1-9
nomisec STUB
by eunomie · poc
https://github.com/eunomie/cve-2022-42889-check
nomisec WORKING POC
by hotblac · poc
https://github.com/hotblac/text4shell
nomisec WORKING POC
by rockmelodies · poc
https://github.com/rockmelodies/CVE-2022-42889
gitlab WORKING POC
by ndanhdien98 · remote
https://gitlab.com/ndanhdien98/text4shell-poc
nomisec WORKING POC
by Dima2021 · remote
https://github.com/Dima2021/cve-2022-42889-text4shell
nomisec WORKING POC
by aaronm-sysdig · remote
https://github.com/aaronm-sysdig/text4shell-docker
nomisec WORKING POC
by Sic4rio · remote
https://github.com/Sic4rio/CVE-2022-42889
nomisec WORKING POC
by 34006133 · remote
https://github.com/34006133/CVE-2022-42889
nomisec WORKING POC
by joshbnewton31080 · remote
https://github.com/joshbnewton31080/cve-2022-42889-text4shell
nomisec WORKING POC
by MendDemo-josh · remote
https://github.com/MendDemo-josh/cve-2022-42889-text4shell
nomisec WORKING POC
by galoget · poc
https://github.com/galoget/CVE-2022-42889-Text4Shell-Docker
nomisec WORKING POC
by Goultarde · remote
https://github.com/Goultarde/CVE-2022-42889-text4shell
nomisec WORKING POC
by neerazz · remote
https://github.com/neerazz/CVE-2022-42889
nomisec WORKING POC
by DimaMend · remote
https://github.com/DimaMend/cve-2022-42889-text4shell
metasploit WORKING POC EXCELLENT
by Alvaro Muñoz, Karthik UJ, Gaurav Jain · rubypocjava
https://github.com/rapid7/metasploit-framework/blob/master/modules/exploits/multi/http/apache_commons_text4shell.rb
vulncheck_xdb WORKING POC
remote-auth
https://github.com/pwnb0y/Text4shell-exploit
vulncheck_xdb WORKING POC
remote
https://github.com/joseluisinigo/riskootext4shell
vulncheck_xdb WORKING POC
remote
https://github.com/junius-sec/kr-vulhub
exploitdb WORKING POC
by Arjun Chaudhary · pythonwebappsmultiple
https://www.exploit-db.com/exploits/52261

Nuclei Templates (1)

Text4Shell - Remote Code Execution
CRITICALby mordavid,princechaddha

Scores

CVSS v3 9.8
EPSS 0.9425
EPSS Percentile 99.9%
Attack Vector NETWORK
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H

Exploitation Intel

VulnCheck KEV 2023-01-12
InTheWild.io 2023-01-12

Classification

CWE
CWE-94
Status published

Affected Products (9)

apache/commons_text < 1.10.0
netapp/bluexp
juniper/security_threat_response_manager < 7.5.0
juniper/security_threat_response_manager
juniper/security_threat_response_manager
juniper/security_threat_response_manager
juniper/security_threat_response_manager
org.apache.commons/commons-text < 1.10.0Maven
com.guicedee.services/commons-text Maven

Timeline

Published Oct 13, 2022
Tracked Since Feb 18, 2026