
Cloud Vulnerability DB
A community-led vulnerabilities database
Apache Commons Configuration, identified as CVE-2022-33980, is a critical vulnerability discovered in versions 2.4 through 2.7 of the Apache Commons Configuration library. The vulnerability was disclosed on July 5, 2022, affecting the variable interpolation functionality that allows properties to be dynamically evaluated and expanded. The standard format for interpolation '${prefix:name}' includes default Lookup instances that could lead to arbitrary code execution or unauthorized contact with remote servers (Openwall List, NVD).
The vulnerability stems from three problematic default lookup prefixes: 'script' (allowing execution of expressions using the JVM script execution engine), 'dns' (for resolving DNS records), and 'url' (for loading values from URLs, including remote servers). The vulnerability received a CVSS v3.1 base score of 9.8 (CRITICAL) with the vector string CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H. In Java versions 8 through 15, the Nashorn script engine was provided by default, making script execution possible without additional configuration (Snyk Blog).
The vulnerability can lead to remote code execution (RCE) if untrusted configuration values are used. Attackers who can control configuration files could potentially execute arbitrary code on application servers, leading to system compromise and network pivoting. Additionally, the vulnerability could result in unintentional contact with remote servers, potentially leading to data exposure or system manipulation (Snyk Blog, NetApp Advisory).
Users are strongly recommended to upgrade to Apache Commons Configuration version 2.8.0, which disables the problematic interpolators (script, dns, and url) by default. In version 2.8.0, other types of lookups require explicit system property changes to permit their behavior. This restriction of default lookup prefixes significantly reduces the impact of maliciously controlled configuration files (Openwall List, Debian Security).
Source: This report was generated using AI
Free Vulnerability Assessment
Evaluate your cloud security practices across 9 security domains to benchmark your risk level and identify gaps in your defenses.
Get a personalized demo
"Best User Experience I have ever seen, provides full visibility to cloud workloads."
"Wiz provides a single pane of glass to see what is going on in our cloud environments."
"We know that if Wiz identifies something as critical, it actually is."