当前位置:网站首页>Apache multiple component vulnerability disclosure (cve-2022-32533/cve-2022-33980/cve-2021-37839)
Apache multiple component vulnerability disclosure (cve-2022-32533/cve-2022-33980/cve-2021-37839)
2022-07-07 14:51:00 【51CTO】
OSCS( Open source software supply chain security community ) Launch free vulnerabilities 、 Poison information subscription service , Community users can subscribe to intelligence information through robots , For specific subscription methods, please refer to : https://www.oscs1024.com/?src=wx
7 month 6 Japan ,OSCS Detected Apache The loopholes of many projects under the foundation are open , Please pay attention to the corresponding component users .
Summary of vulnerability
1、Apache Portals Jetspeed-2(CVE-2022-32533)
Apache Portals Jetspeed-2 User input is not handled securely , Led to including XSS、CSRF、XXE and SSRF Including many problems .
- Vulnerability impact level : Middle risk
- Utilization cost : low
- Affected components :
- Affects version :\[\*,2.3.1\], The government no longer maintains , No fix version
- CVE Number :CVE-2022-32533
With XSS For example , The registered user name is set to
But officials say Apache Portals Jetspeed-2 yes Apache Portals Items that are no longer maintained in , No updates will be provided ,OSCS Suggest developers to replace .
Reference link :
2、Apache Commons Configuration(CVE-2022-33980)
Apache Commons Configuration Is a component for managing configuration files , stay 2.8 Some previous versions supported multiple variable value methods , Include javax.script、dns and url, Result in arbitrary code execution or network access .
- Vulnerability impact level : Middle risk
- Utilization cost : high
- Affected components :
- Affects version :\[2.4,2.8.0), The authorities are already in 2.8.0 Version fixes this problem by disabling dangerous methods
- CVE Number :CVE-2022-33980
Form like ${prefix:name} The string of can be parsed , When interpolate When the string of the operation is controllable , Vulnerabilities can be exploited , Supported by prefix Here's the picture .

The following code can trigger

Reference link :
3、Apache Superset(CVE-2021-37839) Apache Superset Is a data visualization and data exploration platform .
stay Apache Superset In the affected version , Authenticated users can access metadata information related to the dataset without authorization , Include dataset name 、 Columns and indicators .
- Vulnerability impact level : Middle risk
- Utilization cost : in
- Affected components :
- Affects version :\[\*,1.5.1), The authorities are already in 1.5.1 Version to fix this
- CVE Number :CVE-2021-37839
The disposal of advice
OSCS It is recommended that users use the above components according to the above risk tips , Repair to a safe version as soon as possible .
See more vulnerability information : https://www.oscs1024.com/hl
Learn more about
1、 Free use OSCS Intelligence subscription service
OSCS ( Open source software supply chain security community ) The latest security risk dynamics of open source projects will be released at the first time , Including open source component security vulnerabilities 、 Information such as events , Community users can use enterprise and wechat 、 nailing 、 Fly Book Robot and other ways to subscribe to intelligence information , For specific subscription methods, please refer to :


边栏推荐
- 2022pagc Golden Sail award | rongyun won the "outstanding product technology service provider of the year"
- Source code analysis of ArrayList
- 【服务器数据恢复】某品牌StorageWorks服务器raid数据恢复案例
- Deformable convolutional dense network for enhancing compressed video quality
- How bad can a programmer be? Nima, they are all talents
- 15、文本编辑工具VIM使用
- LeetCode 648. Word replacement
- [server data recovery] a case of RAID data recovery of a brand StorageWorks server
- Mlgo: Google AI releases industrial compiler optimized machine learning framework
- Base64 encoding
猜你喜欢

LeetCode 648. Word replacement

Mmkv use and principle

【服务器数据恢复】某品牌StorageWorks服务器raid数据恢复案例

CPU与chiplet技术杂谈

Multi merchant mall system function disassembly lecture 01 - Product Architecture

15、文本编辑工具VIM使用

上半年晋升 P8 成功,还买了别墅!

Bill Gates posted his resume 48 years ago: "it's not as good-looking as yours."

Instructions d'utilisation de la trousse de développement du module d'acquisition d'accord du testeur mictr01

Stm32cubemx, 68 sets of components, following 10 open source protocols
随机推荐
解析PHP跳出循环的方法以及continue、break、exit的区别介绍
一文读懂数仓中的pg_stat
Lidar knowledge drops
ES日志报错赏析-- allow delete
Shengteng experience officer Episode 5 notes I
潘多拉 IOT 开发板学习(HAL 库)—— 实验12 RTC实时时钟实验(学习笔记)
【愚公系列】2022年7月 Go教学课程 005-变量
Mmkv use and principle
Deformable convolutional dense network for enhancing compressed video quality
FFmpeg----图片处理
Because the employee set the password to "123456", amd stolen 450gb data?
EMQX 5.0 发布:单集群支持 1 亿 MQTT 连接的开源物联网消息服务器
PD虚拟机教程:如何在ParallelsDesktop虚拟机中设置可使用的快捷键?
【服务器数据恢复】某品牌StorageWorks服务器raid数据恢复案例
ES日志报错赏析-trying to create too many buckets
Apache多个组件漏洞公开(CVE-2022-32533/CVE-2022-33980/CVE-2021-37839)
Reading and understanding of eventbus source code
PLC:自动纠正数据集噪声,来洗洗数据集吧 | ICLR 2021 Spotlight
Navigation - are you sure you want to take a look at such an easy-to-use navigation framework?
Notes de l'imprimante substance: paramètres pour les affichages Multi - écrans et multi - Résolutions