• Menu
  • Skip to main content
  • Skip to primary sidebar

The Cyber Security News

Latest Cyber Security News

Header Right

  • Latest News
  • Vulnerabilities
  • Cloud Services
hackers started exploiting critical "text4shell" apache commons text vulnerability

Hackers Started Exploiting Critical “Text4Shell” Apache Commons Text Vulnerability

You are here: Home / General Cyber Security News / Hackers Started Exploiting Critical “Text4Shell” Apache Commons Text Vulnerability
October 21, 2022

WordPress security firm Wordfence on Thursday said it started off detecting exploitation tries targeting the recently disclosed flaw in Apache Commons Text on October 18, 2022.

The vulnerability, tracked as CVE-2022-42889 aka Text4Shell, has been assigned a severity ranking of 9.8 out of a doable 10. on the CVSS scale and has an effect on versions 1.5 by 1.9 of the library.

It is really also identical to the now infamous Log4Shell vulnerability in that the issue is rooted in the method string substitutions carried out throughout DNS, script, and URL lookups could direct to the execution of arbitrary code on prone devices when passing untrusted input.

✔ Approved Seller From Our Partners
Mullvad VPN Discount

Protect your privacy by Mullvad VPN. Mullvad VPN is one of the famous brands in the security and privacy world. With Mullvad VPN you will not even be asked for your email address. No log policy, no data from you will be saved. Get your license key now from the official distributor of Mullvad with discount: SerialCart® (Limited Offer).

➤ Get Mullvad VPN with 12% Discount


CyberSecurity

A prosperous exploitation of the flaw can help a threat actor to open a reverse shell connection with the susceptible application just through a specially crafted payload, correctly opening the door for stick to-on attacks.

Though the issue was originally documented in early March 2022, the Apache Software program Foundation (ASF) released an current model of the software program (1.10.) on September 24, followed by issuing an advisory only past 7 days on Oct 13.

“Fortuitously, not all users of this library would be influenced by this vulnerability – not like Log4J in the Log4Shell vulnerability, which was susceptible even in its most standard use-conditions,” Checkmarx researcher Yaniv Nizry said.

“Apache Commons Text will have to be utilised in a specified way to expose the attack floor and make the vulnerability exploitable.”

Wordfence also reiterated that the probability of prosperous exploitation is significantly limited in scope when as opposed to Log4j, with most of the payloads noticed so considerably developed to scan for susceptible installations.

“A profitable attempt would consequence in the target internet site producing a DNS question to the attacker-controlled listener area,” Wordfence researcher Ram Gall said, adding requests with script and URL prefixes have been comparatively lower in volume.

CyberSecurity

If anything at all, the advancement is but an additional indication of the likely security pitfalls posed by third-party open up source dependencies, necessitating that businesses routinely evaluate their attack floor and set up suitable patch administration methods.

Buyers who have direct dependencies on Apache Commons Text are proposed to update to the fixed edition to mitigate possible threats. According to Maven Repository, as several as 2,593 assignments use the Apache Commons Text library.

The Apache Commons Textual content flaw also follows one more critical security weak spot that was disclosed in Apache Commons Configuration in July 2022 (CVE-2022-33980, CVSS rating: 9.8), which could consequence in arbitrary code execution through the variable interpolation features.

Uncovered this post intriguing? Observe THN on Facebook, Twitter  and LinkedIn to go through much more exceptional material we put up.


Some components of this post are sourced from:
thehackernews.com

Previous Post: «a quick look at the "strengthening america's cybersecurity" initiative A Quick Look at the “Strengthening America’s Cybersecurity” Initiative
Next Post: Lesson Learned: How SolarWinds Strengthened its Security Post-Incident Cyber Security News»

Reader Interactions

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

Primary Sidebar

Report This Article

Recent Posts

  • Zero-Click Agentic Browser Attack Can Delete Entire Google Drive Using Crafted Emails
  • Critical XXE Bug CVE-2025-66516 (CVSS 10.0) Hits Apache Tika, Requires Urgent Patch
  • Chinese Hackers Have Started Exploiting the Newly Disclosed React2Shell Vulnerability
  • Intellexa Leaks Reveal Zero-Days and Ads-Based Vector for Predator Spyware Delivery
  • “Getting to Yes”: An Anti-Sales Guide for MSPs
  • CISA Reports PRC Hackers Using BRICKSTORM for Long-Term Access in U.S. Systems
  • JPCERT Confirms Active Command Injection Attacks on Array AG Gateways
  • Silver Fox Uses Fake Microsoft Teams Installer to Spread ValleyRAT Malware in China
  • ThreatsDay Bulletin: Wi-Fi Hack, npm Worm, DeFi Theft, Phishing Blasts— and 15 More Stories
  • 5 Threats That Reshaped Web Security This Year [2025]

Copyright © TheCyberSecurity.News, All Rights Reserved.