Snyk has a proof-of-concept or detailed explanation of how to exploit this vulnerability.
The probability is the direct output of the EPSS model, and conveys an overall sense of the threat of exploitation in the wild. The percentile measures the EPSS probability relative to all known EPSS scores. Note: This data is updated daily, relying on the latest available EPSS model version. Check out the EPSS documentation for more details.
In a few clicks we can analyze your entire application and see what components are vulnerable in your application, and suggest you quick fixes.
Test your applicationsLearn about Arbitrary Code Execution vulnerabilities in an interactive lesson.
Start learningUpgrade org.apache.commons:commons-text
to version 1.10.0 or higher.
Affected versions of this package are vulnerable to Arbitrary Code Execution via the StringSubstitutor
interpolator object. Exploiting this vulnerability is possible when untrusted data flows into the StringSubstitutor.replace()
or StringSubstitutor.replaceIn()
methods.
Due to the nature of these methods as ones that process application data and not user input, a remote attacker would need prior access to a system in the affected environment positioned to supply such data.
Notes
The Nashorn scripting engine that can be used to exploit this vulnerability was available by default in JDKs up to 14.0.2. As of JDK 15, this vulnerability can only be exploited if another scripting engine has been added, such as JEXL.
Vulnerable lookups:
script
- executes expressions using the JVM script execution engine (javax.script)
dns
- resolves dns records
url
- loads values from urls, including from remote servers
final StringSubstitutor interpolator = StringSubstitutor.createInterpolator();
String out = interpolator.replace("${script:javascript:java.lang.Runtime.getRuntime().exec('touch /tmp/foo')}");
System.out.println(out);