Apache Commons Text Version seems to have an upgrade soon.
The set of default Lookup instances included interpolators that could result in arbitrary code execution or contact with remote servers.
These lookups are: - "script" - execute expressions using the JVM script execution engine (javax.script) - "dns" - resolve dns records - "url" - load values from urls, including from remote servers Applications using the interpolation defaults in the affected versions may be vulnerable to remote code execution or unintentional contact with remote servers if untrusted configuration values are used
Would it be a threat to Altassian cloud product?
Any Compensation Control applied for Internet facing system (e.g. Target Signature (IPS or WAF) update)? If so, any target Mitigation Date (Upgrade to Apache Commons Text Version 1.10 or later)?
Online forums and learning are now in one easy-to-use experience.
By continuing, you accept the updated Community Terms of Use and acknowledge the Privacy Policy. Your public name, photo, and achievements may be publicly visible and available in search engines.