当前位置:网站首页>Apache multiple component vulnerability disclosure (cve-2022-32533/cve-2022-33980/cve-2021-37839)
Apache multiple component vulnerability disclosure (cve-2022-32533/cve-2022-33980/cve-2021-37839)
2022-07-07 14:51:00 【51CTO】
OSCS( Open source software supply chain security community ) Launch free vulnerabilities 、 Poison information subscription service , Community users can subscribe to intelligence information through robots , For specific subscription methods, please refer to : https://www.oscs1024.com/?src=wx
7 month 6 Japan ,OSCS Detected Apache The loopholes of many projects under the foundation are open , Please pay attention to the corresponding component users .
Summary of vulnerability
1、Apache Portals Jetspeed-2(CVE-2022-32533)
Apache Portals Jetspeed-2 User input is not handled securely , Led to including XSS、CSRF、XXE and SSRF Including many problems .
- Vulnerability impact level : Middle risk
- Utilization cost : low
- Affected components :
- Affects version :\[\*,2.3.1\], The government no longer maintains , No fix version
- CVE Number :CVE-2022-32533
With XSS For example , The registered user name is set to
But officials say Apache Portals Jetspeed-2 yes Apache Portals Items that are no longer maintained in , No updates will be provided ,OSCS Suggest developers to replace .
Reference link :
2、Apache Commons Configuration(CVE-2022-33980)
Apache Commons Configuration Is a component for managing configuration files , stay 2.8 Some previous versions supported multiple variable value methods , Include javax.script、dns and url, Result in arbitrary code execution or network access .
- Vulnerability impact level : Middle risk
- Utilization cost : high
- Affected components :
- Affects version :\[2.4,2.8.0), The authorities are already in 2.8.0 Version fixes this problem by disabling dangerous methods
- CVE Number :CVE-2022-33980
Form like ${prefix:name} The string of can be parsed , When interpolate When the string of the operation is controllable , Vulnerabilities can be exploited , Supported by prefix Here's the picture .

The following code can trigger

Reference link :
3、Apache Superset(CVE-2021-37839) Apache Superset Is a data visualization and data exploration platform .
stay Apache Superset In the affected version , Authenticated users can access metadata information related to the dataset without authorization , Include dataset name 、 Columns and indicators .
- Vulnerability impact level : Middle risk
- Utilization cost : in
- Affected components :
- Affects version :\[\*,1.5.1), The authorities are already in 1.5.1 Version to fix this
- CVE Number :CVE-2021-37839
The disposal of advice
OSCS It is recommended that users use the above components according to the above risk tips , Repair to a safe version as soon as possible .
See more vulnerability information : https://www.oscs1024.com/hl
Learn more about
1、 Free use OSCS Intelligence subscription service
OSCS ( Open source software supply chain security community ) The latest security risk dynamics of open source projects will be released at the first time , Including open source component security vulnerabilities 、 Information such as events , Community users can use enterprise and wechat 、 nailing 、 Fly Book Robot and other ways to subscribe to intelligence information , For specific subscription methods, please refer to :


边栏推荐
- Attribute keywords serveronly, sqlcolumnnumber, sqlcomputecode, sqlcomputed
- #yyds干货盘点# 解决名企真题:交叉线
- FFmpeg----图片处理
- 小程序目录结构
- asp.netNBA信息管理系统VS开发sqlserver数据库web结构c#编程计算机网页源码项目详细设计
- 2022PAGC 金帆奖 | 融云荣膺「年度杰出产品技术服务商」
- ES日志报错赏析-trying to create too many buckets
- Zhiting doesn't use home assistant to connect Xiaomi smart home to homekit
- PD virtual machine tutorial: how to set the available shortcut keys in the parallelsdesktop virtual machine?
- The method of parsing PHP to jump out of the loop and the difference between continue, break and exit
猜你喜欢

Data Lake (IX): Iceberg features and data types
![[Yugong series] go teaching course 005 variables in July 2022](/img/66/4265a06a98412bd2c88d8281caf06e.png)
[Yugong series] go teaching course 005 variables in July 2022

全球首款 RISC-V 笔记本电脑开启预售,专为元宇宙而生!

STM32CubeMX,68套组件,遵循10条开源协议

【愚公系列】2022年7月 Go教学课程 005-变量
![leetcode:648. Word replacement [dictionary tree board + find the shortest matching prefix among several prefixes]](/img/3e/cdde4b436821af8700eb65d35e8f59.png)
leetcode:648. Word replacement [dictionary tree board + find the shortest matching prefix among several prefixes]

Cocoscreator operates spine for animation fusion

Full details of efficientnet model

WebRTC 音频抗弱网技术(上)

asp.netNBA信息管理系统VS开发sqlserver数据库web结构c#编程计算机网页源码项目详细设计
随机推荐
Mlgo: Google AI releases industrial compiler optimized machine learning framework
Protection strategy of server area based on Firewall
2022pagc Golden Sail award | rongyun won the "outstanding product technology service provider of the year"
Démontage de la fonction du système multi - Merchant Mall 01 - architecture du produit
Lidar Knowledge Drop
Applet directory structure
Electronic remote error
Read PG in data warehouse in one article_ stat
Simple use of websocket
Xiaomi's path of chip self-development
Analysis of arouter
ES日志报错赏析-- allow delete
JS image to Base64
Es log error appreciation -- allow delete
Webrtc audio anti weak network technology (Part 1)
NLLB-200:Meta开源新模型,可互译200种语言
13 ux/ui/ue best creative inspiration websites in 2022
Small game design framework
Es log error appreciation -trying to create too many buckets
Instructions for mictr01 tester vibrating string acquisition module development kit