当前位置:网站首页>Apache multiple component vulnerability disclosure (cve-2022-32533/cve-2022-33980/cve-2021-37839)
Apache multiple component vulnerability disclosure (cve-2022-32533/cve-2022-33980/cve-2021-37839)
2022-07-08 01:47:00 【Murphy safety】
OSCS( Open source software supply chain security community ) Launch free vulnerabilities 、 Poison information subscription service , Community users can subscribe to intelligence information through robots , For specific subscription methods, please refer to :
https://www.oscs1024.com/?src=csdn
7 month 6 Japan ,OSCS Detected Apache The loopholes of many projects under the foundation are open , Please pay attention to the developers who use the corresponding components .
Vulnerability description
1、Apache Portals Jetspeed-2(CVE-2022-32533)
Apache Portals Jetspeed-2 User input is not handled securely , Led to including XSS、CSRF、XXE and SSRF Including many problems .
- Vulnerability impact level : Middle risk
- Utilization cost : low
- Affected components :org.apache.portals.jetspeed-2:jetspeed-2
- Affects version :[*,2.3.1], The government no longer maintains , No fix version
- CVE Number :CVE-2022-32533
With XSS For example , The registered user name is set to when , After registering and logging in, each time the user name is loaded, a pop-up window will be triggered , To configure xss.filter.post = true Can mitigate risks .
But officials say Apache Portals Jetspeed-2 yes Apache Portals Items that are no longer maintained in , No updates will be provided ,OSCS Suggest developers to replace .
Reference link :
https://www.oscs1024.com/hd/MPS-2022-17607/?src=csdn
https://nvd.nist.gov/vuln/detail/CVE-2022-32533
2、Apache Commons Configuration(CVE-2022-33980)
Apache Commons Configuration Is a component for managing configuration files , stay 2.8 Some previous versions supported multiple variable value methods , Include javax.script、dns and url, Result in arbitrary code execution or network access .
- Vulnerability impact level : Middle risk
- Utilization cost : high
- Affected components :org.apache.commons:commons-configuration2
- Affects version :[2.4,2.8.0), The authorities are already in 2.8.0 Version fixes this problem by disabling dangerous methods
- CVE Number :CVE-2022-33980
Form like ${prefix:name}
The string of can be parsed , When interpolate When the string of the operation is controllable , Vulnerabilities can be exploited , Supported by prefix Here's the picture .
The following code can trigger
Reference link :
https://www.oscs1024.com/hd/MPS-2022-19214/?src=csdn
https://nvd.nist.gov/vuln/detail/CVE-2022-33980
3、Apache Superset(CVE-2021-37839)
Apache Superset Is a data visualization and data exploration platform . stay Apache Superset In the affected version , Authenticated users can access metadata information related to the dataset without authorization , Include dataset name 、 Columns and indicators .
- Vulnerability impact level : Middle risk
- Utilization cost : in
- Affected components :apache-superset
- Affects version :[*,1.5.1), The authorities are already in 1.5.1 Version to fix this
- CVE Number :CVE-2021-37839
Reference link :
https://www.oscs1024.com/hd/MPS-2021-28604/?src=csdn
https://nvd.nist.gov/vuln/detail/CVE-2021-37839
The disposal of advice
OSCS It is recommended that users use the above components according to the above risk tips , Repair to a safe version as soon as possible .
See more vulnerability information :https://www.oscs1024.com/hl
Learn more about
1、 Free use OSCS Intelligence subscription service
OSCS ( Open source software supply chain security community ) The latest security risk dynamics of open source projects will be released at the first time , Including open source component security vulnerabilities 、 Information such as events , Community users can use enterprise and wechat 、 nailing 、 Fly Book Robot and other ways to subscribe to intelligence information , For specific subscription methods, please refer to :
https://www.oscs1024.com/docs/vuln-warning/intro/
————————————————
Copyright notice : This paper is about CSDN Blogger 「 Open source ecological security OSCS」 The original article of , follow CC 4.0 BY-SA Copyright agreement , For reprint, please attach the original source link and this statement .
Link to the original text :https://blog.csdn.net/cups107/article/details/125653978
边栏推荐
- Js中forEach map无法跳出循环问题以及forEach会不会修改原数组
- Break algorithm --- map
- Matlab code about cosine similarity
- Kafka-connect将Kafka数据同步到Mysql
- nacos-微服务网关Gateway组件 +Swagger2接口生成
- Codeforces Round #633 (Div. 2) B. Sorted Adjacent Differences
- ROS problems (topic types do not match, topic datatype/md5sum not match, MSG XXX have changed. rerun cmake)
- 滑环在直驱电机转子的应用领域
- How to fix the slip ring
- Grey correlation analysis link (portal) matlab
猜你喜欢
qt--將程序打包--不要安裝qt-可以直接運行
Introduction to grpc for cloud native application development
The function of carbon brush slip ring in generator
MATLAB R2021b 安装libsvm
Remote sensing contribution experience sharing
Kindle operation: transfer downloaded books and change book cover
Understanding of maximum likelihood estimation
Redis集群
qt--将程序打包--不要安装qt-可以直接运行
Qt - - Packaging Programs - - Don't install Qt - can run directly
随机推荐
LeetCode 练习——剑指 Offer 36. 二叉搜索树与双向链表
3、多智能体强化学习
Tencent game client development interview (unity + cocos) double bombing social recruitment 6 rounds of interviews
Codeforces Round #633 (Div. 2) B. Sorted Adjacent Differences
Why does the updated DNS record not take effect?
About how USRP sets the sampling frequency below the minimum sampling frequency reached by the hardware
qt--將程序打包--不要安裝qt-可以直接運行
npm 內部拆分模塊
什么样的MES系统才是好系统
Leetcode exercise - Sword finger offer 36 Binary search tree and bidirectional linked list
Sum of submatrix
项目经理有必要考NPDP吗?我告诉你答案
Qt - - Packaging Programs - - Don't install Qt - can run directly
【目标跟踪】|atom
Get familiar with XML parsing quickly
The function of carbon brush slip ring in generator
break algorithm---刷题map
qt-使用自带的应用框架建立--hello world--使用min GW 32bit
Common operations of numpy on two-dimensional array
ROS 问题(topic types do not match、topic datatype/md5sum not match、msg xxx have changed. rerun cmake)