[#14416] - commons-configuration2-2.7.jar --

Category:
Bug report
Priority:
Urgent
Status:
New
Project: Severity:
Major
Resolution:
Open
Component: Reproducibility:
Always
Assigned to:

commons-configuration2-2.7.jar located at jasperserver.war/WEB-INF/lib

Critical risk CVSS score is in violation for the following reason(s):
Found security vulnerability CVE-2022-33980 with severity >= 9 (severity = 9.8)

Description from CVE
Apache Commons Configuration performs variable interpolation, allowing properties to be dynamically evaluated and expanded. The standard format for interpolation is "${prefix:name}", where "prefix" is used to locate an instance of org.apache.commons.configuration2.interpol.Lookup that performs the interpolation. Starting with version 2.4 and continuing through 2.7, the set of default Lookup instances included interpolators that could result in arbitrary code execution or contact with remote servers. These lookups are: - "script" - execute expressions using the JVM script execution engine (javax.script) - "dns" - resolve dns records - "url" - load values from urls, including from remote servers Applications using the interpolation defaults in the affected versions may be vulnerable to remote code execution or unintentional contact with remote servers if untrusted configuration values are used. Users are recommended to upgrade to Apache Commons Configuration 2.8.0, which disables the problematic interpolators by default.

Explanation
The Apache commons-configuration2 package is vulnerable to Code Injection. The getDefaultPrefixLookups() method in the ConfigurationInterpolator class allows for interpolation on script, dns, and url lookups by default. A remote attacker who can supply or influence the configuration values used by an affected application can exploit this vulnerability to execute Server-Side Request Forgery, Remote Code Execution (RCE), or other unexpected behavior.

Detection
The application is vulnerable by using this component if it accepts configuration values from untrusted sources.

Recommendation
We recommend upgrading to a version of this component that is not vulnerable to this specific issue.

Note: If this component is included as a bundled/transitive dependency of another component, there may not be an upgrade path. In this instance, we recommend contacting the maintainers who included the vulnerable package. Alternatively, we recommend investigating alternative components or a potential mitigating control.

Root Cause
commons-configuration2-2.7.jarorg/apache/commons/configuration2/interpol/ConfigurationInterpolator.class[2.4, 2.8-RC1)

v8.1
JasperServer
msilvers's picture
Joined: Sep 16 2021 - 9:58am
Last seen: 2 weeks 4 days ago
Feedback
randomness