当前位置:网站首页>Apache multiple component vulnerability disclosure (cve-2022-32533/cve-2022-33980/cve-2021-37839)
Apache multiple component vulnerability disclosure (cve-2022-32533/cve-2022-33980/cve-2021-37839)
2022-07-07 14:51:00 【51CTO】
OSCS( Open source software supply chain security community ) Launch free vulnerabilities 、 Poison information subscription service , Community users can subscribe to intelligence information through robots , For specific subscription methods, please refer to : https://www.oscs1024.com/?src=wx
7 month 6 Japan ,OSCS Detected Apache The loopholes of many projects under the foundation are open , Please pay attention to the corresponding component users .
Summary of vulnerability
1、Apache Portals Jetspeed-2(CVE-2022-32533)
Apache Portals Jetspeed-2 User input is not handled securely , Led to including XSS、CSRF、XXE and SSRF Including many problems .
- Vulnerability impact level : Middle risk
- Utilization cost : low
- Affected components :
- Affects version :\[\*,2.3.1\], The government no longer maintains , No fix version
- CVE Number :CVE-2022-32533
With XSS For example , The registered user name is set to
But officials say Apache Portals Jetspeed-2 yes Apache Portals Items that are no longer maintained in , No updates will be provided ,OSCS Suggest developers to replace .
Reference link :
2、Apache Commons Configuration(CVE-2022-33980)
Apache Commons Configuration Is a component for managing configuration files , stay 2.8 Some previous versions supported multiple variable value methods , Include javax.script、dns and url, Result in arbitrary code execution or network access .
- Vulnerability impact level : Middle risk
- Utilization cost : high
- Affected components :
- Affects version :\[2.4,2.8.0), The authorities are already in 2.8.0 Version fixes this problem by disabling dangerous methods
- CVE Number :CVE-2022-33980
Form like ${prefix:name} The string of can be parsed , When interpolate When the string of the operation is controllable , Vulnerabilities can be exploited , Supported by prefix Here's the picture .

The following code can trigger

Reference link :
3、Apache Superset(CVE-2021-37839) Apache Superset Is a data visualization and data exploration platform .
stay Apache Superset In the affected version , Authenticated users can access metadata information related to the dataset without authorization , Include dataset name 、 Columns and indicators .
- Vulnerability impact level : Middle risk
- Utilization cost : in
- Affected components :
- Affects version :\[\*,1.5.1), The authorities are already in 1.5.1 Version to fix this
- CVE Number :CVE-2021-37839
The disposal of advice
OSCS It is recommended that users use the above components according to the above risk tips , Repair to a safe version as soon as possible .
See more vulnerability information : https://www.oscs1024.com/hl
Learn more about
1、 Free use OSCS Intelligence subscription service
OSCS ( Open source software supply chain security community ) The latest security risk dynamics of open source projects will be released at the first time , Including open source component security vulnerabilities 、 Information such as events , Community users can use enterprise and wechat 、 nailing 、 Fly Book Robot and other ways to subscribe to intelligence information , For specific subscription methods, please refer to :


边栏推荐
- 6. Electron borderless window and transparent window lock mode setting window icon
- How bad can a programmer be? Nima, they are all talents
- PAG体验:十分钟完成AE动效部署上线各平台!
- 全球首款 RISC-V 笔记本电脑开启预售,专为元宇宙而生!
- Pytorch model trains practical skills and breaks through the bottleneck of speed
- Pinduoduo lost the lawsuit, and the case of bargain price difference of 0.9% was sentenced; Wechat internal test, the same mobile phone number can register two account functions; 2022 fields Awards an
- Pandora IOT development board learning (HAL Library) - Experiment 12 RTC real-time clock experiment (learning notes)
- 「2022年7月」WuKong编辑器更版记录
- Half an hour of hands-on practice of "live broadcast Lianmai construction", college students' resume of technical posts plus points get!
- Es log error appreciation -maximum shards open
猜你喜欢

Substance painter notes: settings for multi display and multi-resolution displays

Novel Slot Detection: A Benchmark for Discovering Unknown Slot Types in the Dialogue System

Navigation - are you sure you want to take a look at such an easy-to-use navigation framework?

Mmkv use and principle

Démontage de la fonction du système multi - Merchant Mall 01 - architecture du produit

Simple use of websocket

Infinite innovation in cloud "vision" | the 2022 Alibaba cloud live summit was officially launched
![leetcode:648. Word replacement [dictionary tree board + find the shortest matching prefix among several prefixes]](/img/3e/cdde4b436821af8700eb65d35e8f59.png)
leetcode:648. Word replacement [dictionary tree board + find the shortest matching prefix among several prefixes]

2022pagc Golden Sail award | rongyun won the "outstanding product technology service provider of the year"

Instructions for mictr01 tester vibrating string acquisition module development kit
随机推荐
低代码平台中的数据连接方式(下)
Pytorch model trains practical skills and breaks through the bottleneck of speed
Cocos creator direction and angle conversion
PyTorch模型训练实战技巧,突破速度瓶颈
Infinite innovation in cloud "vision" | the 2022 Alibaba cloud live summit was officially launched
[Yugong series] go teaching course 005 variables in July 2022
Small game design framework
半小时『直播连麦搭建』动手实战,大学生技术岗位简历加分项get!
Novel Slot Detection: A Benchmark for Discovering Unknown Slot Types in the Dialogue System
云上“视界” 创新无限 | 2022阿里云直播峰会正式上线
Read PG in data warehouse in one article_ stat
Leetcode——344. Reverse string /541 Invert string ii/151 Reverse the word / Sword finger in the string offer 58 - ii Rotate string left
EMQX 5.0 发布:单集群支持 1 亿 MQTT 连接的开源物联网消息服务器
大厂做开源的五大痛点
In the field of software engineering, we have been doing scientific research for ten years!
#yyds干货盘点# 解决名企真题:交叉线
C# 6.0 语言规范获批
Demis Hassabis谈AlphaFold未来目标
2022PAGC 金帆奖 | 融云荣膺「年度杰出产品技术服务商」
MicTR01 Tester 振弦采集模塊開發套件使用說明