当前位置:网站首页>Apache multiple component vulnerability disclosure (cve-2022-32533/cve-2022-33980/cve-2021-37839)
Apache multiple component vulnerability disclosure (cve-2022-32533/cve-2022-33980/cve-2021-37839)
2022-07-07 14:51:00 【51CTO】
OSCS( Open source software supply chain security community ) Launch free vulnerabilities 、 Poison information subscription service , Community users can subscribe to intelligence information through robots , For specific subscription methods, please refer to : https://www.oscs1024.com/?src=wx
7 month 6 Japan ,OSCS Detected Apache The loopholes of many projects under the foundation are open , Please pay attention to the corresponding component users .
Summary of vulnerability
1、Apache Portals Jetspeed-2(CVE-2022-32533)
Apache Portals Jetspeed-2 User input is not handled securely , Led to including XSS、CSRF、XXE and SSRF Including many problems .
- Vulnerability impact level : Middle risk
- Utilization cost : low
- Affected components :
- Affects version :\[\*,2.3.1\], The government no longer maintains , No fix version
- CVE Number :CVE-2022-32533
With XSS For example , The registered user name is set to
But officials say Apache Portals Jetspeed-2 yes Apache Portals Items that are no longer maintained in , No updates will be provided ,OSCS Suggest developers to replace .
Reference link :
2、Apache Commons Configuration(CVE-2022-33980)
Apache Commons Configuration Is a component for managing configuration files , stay 2.8 Some previous versions supported multiple variable value methods , Include javax.script、dns and url, Result in arbitrary code execution or network access .
- Vulnerability impact level : Middle risk
- Utilization cost : high
- Affected components :
- Affects version :\[2.4,2.8.0), The authorities are already in 2.8.0 Version fixes this problem by disabling dangerous methods
- CVE Number :CVE-2022-33980
Form like ${prefix:name} The string of can be parsed , When interpolate When the string of the operation is controllable , Vulnerabilities can be exploited , Supported by prefix Here's the picture .

The following code can trigger

Reference link :
3、Apache Superset(CVE-2021-37839) Apache Superset Is a data visualization and data exploration platform .
stay Apache Superset In the affected version , Authenticated users can access metadata information related to the dataset without authorization , Include dataset name 、 Columns and indicators .
- Vulnerability impact level : Middle risk
- Utilization cost : in
- Affected components :
- Affects version :\[\*,1.5.1), The authorities are already in 1.5.1 Version to fix this
- CVE Number :CVE-2021-37839
The disposal of advice
OSCS It is recommended that users use the above components according to the above risk tips , Repair to a safe version as soon as possible .
See more vulnerability information : https://www.oscs1024.com/hl
Learn more about
1、 Free use OSCS Intelligence subscription service
OSCS ( Open source software supply chain security community ) The latest security risk dynamics of open source projects will be released at the first time , Including open source component security vulnerabilities 、 Information such as events , Community users can use enterprise and wechat 、 nailing 、 Fly Book Robot and other ways to subscribe to intelligence information , For specific subscription methods, please refer to :


边栏推荐
- Differences between cookies and sessions
- KITTI数据集简介与使用
- Electronic remote error
- Zhiting doesn't use home assistant to connect Xiaomi smart home to homekit
- Ascend 910 realizes tensorflow1.15 to realize the Minist handwritten digit recognition of lenet network
- 15、文本编辑工具VIM使用
- The method of parsing PHP to jump out of the loop and the difference between continue, break and exit
- Es log error appreciation -- allow delete
- Mlgo: Google AI releases industrial compiler optimized machine learning framework
- word中删除一整页
猜你喜欢

大厂做开源的五大痛点

防火墙基础之服务器区的防护策略

Computer win7 system desktop icon is too large, how to turn it down

CPU与chiplet技术杂谈

因员工将密码设为“123456”,AMD 被盗 450Gb 数据?

Full details of efficientnet model

Substance Painter笔记:多显示器且多分辨率显示器时的设置

《微信小程序-进阶篇》组件封装-Icon组件的实现(一)

Notes de l'imprimante substance: paramètres pour les affichages Multi - écrans et multi - Résolutions

Webrtc audio anti weak network technology (Part 1)
随机推荐
Nllb-200: meta open source new model, which can translate 200 languages
Navigation - are you sure you want to take a look at such an easy-to-use navigation framework?
Spatiotemporal deformable convolution for compressed video quality enhancement (STDF)
MicTR01 Tester 振弦采集模块开发套件使用说明
Substance Painter筆記:多顯示器且多分辨率顯示器時的設置
Source code analysis of ArrayList
[today in history] July 7: release of C; Chrome OS came out; "Legend of swordsman" issued
小米的芯片自研之路
AWS学习笔记(三)
Es log error appreciation -trying to create too many buckets
Leetcode - Sword finger offer 05 Replace spaces
潘多拉 IOT 开发板学习(HAL 库)—— 实验12 RTC实时时钟实验(学习笔记)
Cocoscreator operates spine for animation fusion
《微信小程序-进阶篇》组件封装-Icon组件的实现(一)
Jetson AGX Orin CANFD 使用
Cvpr2022 | backdoor attack based on frequency injection in medical image analysis
Data Lake (IX): Iceberg features and data types
AWS learning notes (III)
#yyds干货盘点# 解决名企真题:交叉线
用于增强压缩视频质量的可变形卷积密集网络