Palo Alto Networks Security Advisories / CVE-2022-42889

CVE-2022-42889 Impact of Apache Text Commons Vulnerability CVE-2022-42889


047910
Severity 0 · NONE
Attack Vector Not applicable
Scope Not applicable
Attack Complexity Not applicable
Confidentiality Impact NONE
Privileges Required Not applicable
Integrity Impact NONE
User Interaction Not applicable
Availability Impact NONE

Description

Palo Alto Networks has evaluated the Apache Commons Text library vulnerability CVE-2022-42889, known as Text4Shell, for all products and services.

The Palo Alto Networks Product Security Assurance team has confirmed that all products and services are not impacted by this vulnerability.

CVESummary
CVE-2022-42889Apache Commons Text performs variable interpolation, allowing properties to be dynamically evaluated and expanded. The standard format for interpolation is "${prefix:name}", where "prefix" is used to locate an instance of org.apache.commons.text.lookup.StringLookup that performs the interpolation. Starting with version 1.5 and continuing through 1.9, the set of default Lookup instances included interpolators that could result in arbitrary code execution or contact with remote servers. These lookups are: - "script" - execute expressions using the JVM script execution engine (javax.script) - "dns" - resolve dns records - "url" - load values from urls, including from remote servers Applications using the interpolation defaults in the affected versions may be vulnerable to remote code execution or unintentional contact with remote servers if untrusted configuration values are used. Users are recommended to upgrade to Apache Commons Text 1.10.0, which disables the problematic interpolators by default.

Product Status

VersionsAffectedUnaffected
WildFire Cloud NoneAll
WildFire Appliance (WF-500) NoneAll
User-ID Agent NoneAll
SaaS Security NoneAll
Prisma SD-WAN ION NoneAll
Prisma SD-WAN (CloudGenix) NoneAll
Prisma Cloud Compute NoneAll
Prisma Cloud NoneAll
Prisma Access NoneAll
PAN-OS NoneAll
Palo Alto Networks App for Splunk NoneAll
Okyo Garde NoneAll
IoT Security NoneAll
GlobalProtect App NoneAll
Expedition Migration Tool NoneAll
Expanse NoneAll
Exact Data Matching CLI NoneAll
Enterprise Data Loss Prevention NoneAll
Cortex XSOAR NoneAll
Cortex Xpanse NoneAll
Cortex XDR Agent NoneAll
Cortex XDR NoneAll
Cortex Data Lake NoneAll
Cloud NGFW NoneAll
Bridgecrew NoneAll
AutoFocus NoneAll

Severity: NONE

CVSSv3.1 Base Score: 0 (CVSS:3.1/AV:P/AC:H/PR:H/UI:R/S:U/C:N/I:N/A:N)

Exploitation Status

Palo Alto Networks is not aware of any malicious exploitation of this issue on any of our products.

Weakness Type

CWE-94 Improper Control of Generation of Code ('Code Injection')

Solution

No software updates are required at this time.

Workarounds and Mitigations

Customers with a Threat Prevention subscription can block known attacks for CVE-2022-42889 by enabling Threat ID 93157 (Applications and Threats content update 8632). This mitigation reduces the risk of exploitation from known exploits.

Timeline

Initial publication
© 2024 Palo Alto Networks, Inc. All rights reserved.