Security News > 2022 > October > Hackers Started Exploiting Critical "Text4Shell" Apache Commons Text Vulnerability
WordPress security company Wordfence on Thursday said it started detecting exploitation attempts targeting the newly disclosed flaw in Apache Commons Text on October 18, 2022.
While the issue was originally reported in early March 2022, the Apache Software Foundation released an updated version of the software on September 24, followed by issuing an advisory only last week on October 13.
"Apache Commons Text must be used in a certain way to expose the attack surface and make the vulnerability exploitable."
Users who have direct dependencies on Apache Commons Text are recommended to upgrade to the fixed version to mitigate potential threats.
According to Maven Repository, as many as 2,593 projects use the Apache Commons Text library.
The Apache Commons Text flaw also follows another critical security weakness that was disclosed in Apache Commons Configuration in July 2022, which could result in arbitrary code execution through the variable interpolation functionality.
News URL
https://thehackernews.com/2022/10/hackers-started-exploiting-critical.html
Related news
- Hackers target critical zero-day vulnerability in PTZ cameras (source)
- Critical Zimbra RCE vulnerability under mass exploitation (CVE-2024-45519) (source)
- Apple Releases Critical iOS and iPadOS Updates to Fix VoiceOver Password Vulnerability (source)
- Week in review: Critical Zimbra RCE vulnerability exploited, Patch Tuesday forecast (source)
- Critical Apache Avro SDK Flaw Allows Remote Code Execution in Java Applications (source)
- Experts Warn of Critical Unpatched Vulnerability in Linear eMerge E3 Systems (source)
- New Critical GitLab Vulnerability Could Allow Arbitrary CI/CD Pipeline Execution (source)
- Critical Veeam Vulnerability Exploited to Spread Akira and Fog Ransomware (source)
- Iranian hackers act as brokers selling critical infrastructure access (source)
- Critical Kubernetes Image Builder Vulnerability Exposes Nodes to Root Access Risk (source)