Executive summary
A major security vulnerability (CVE-2022-42889) has been discovered in Apache Commons Text versions 1.5 through 1.9. Commons Text is a commonly used library for formatting text. This vulnerability is also colloquially known as “Text4Shell” due to the potential for remote code execution. No Lucidworks Products are vulnerable to this exploit and no mitigation steps are required.
Response matrix
Product | Version | CVE-2022-42889 | Mitigation |
Solr | All | Not Vulnerable | N/A |
Fusion | 5.x | Not Vulnerable | N/A |
Fusion | 4.x and lower | Not Vulnerable | N/A |
Managed Fusion | All | Not Vulnerable | N/A |
App Studio | All | Not Vulnerable | N/A |
Technical summary
Per NIST, "Apache Commons Text performs variable interpolation, allowing properties to be dynamically evaluated and expanded. The standard format for interpolation is "${prefix:name}", where "prefix" is used to locate an instance of org.apache.commons.text.lookup.StringLookup that performs the interpolation. Starting with version 1.5 and continuing through 1.9, the set of default Lookup instances included interpolators that could result in arbitrary code execution or contact with remote servers. These lookups are: - "script" - execute expressions using the JVM script execution engine (javax.script) - "dns" - resolve dns records - "url" - load values from urls, including from remote servers Applications using the interpolation defaults in the affected versions may be vulnerable to remote code execution or unintentional contact with remote servers if untrusted configuration values are used. Users are recommended to upgrade to Apache Commons Text 1.10.0, which disables the problematic interpolators by default." (https://nvd.nist.gov/vuln/detail/CVE-2022-42889)
No mitigation required for Solr
Solr is not vulnerable to CVE-2022-42889. See the Solr Security bulletin for details.
No mitigation required for Fusion 5.x
Fusion 5.x is not vulnerable to CVE-2022-42889, although a security scan run against Fusion 5.x may incorrectly flag the vulnerability as present. This is because the security scan will detect a vulnerable version of Commons Text, however we have confirmed that Fusion does not use the library in such a way that would make it vulnerable to this CVE. If a security scan shows this CVE as present in Fusion 5.x, it can safely be ignored. No mitigation steps are required.
No mitigation required for Fusion 4.x and lower
Fusion 4.x and lower are not impacted by CVE-2022-42889 because they use Commons Text v1.4 or lower.
No mitigation required for App Studio
App Studio is not impacted by CVE-2022-42889 because it uses Commons Text v1.3.
Comments
0 comments
Article is closed for comments.