Details
-
Bug
-
Resolution: Fixed
-
Highest
-
7.13.11, 7.19.2
-
28
-
Severity 3 - Minor
-
250
-
Description
DISCLAIMER
Confluence IS NOT VULNERABLE to CVE-2022-42889.
This bug was created to track the change required to upgrade the Apache Commons Text library and can be used by customers to follow its progress and get notified on the next numbered release.
Confluence does not use the vulnerable module org.apache.commons.text.StringSubstitutor
Issue Summary
Apache Common Text library should be upgraded to 1.10.0 or later to mitigate any exploiting attempts listed on CVE-2022-42889
Steps to Reproduce
Check org.apache.commons -> commons-text version on pom.xml
Expected Results
apache-common-text 1.10.0+ is expected
Actual Results
apache-common-text 1.9 (or earlier) is used
Workaround
Currently, there is no known workaround for this behavior. A workaround will be added here when available
Attachments
Issue Links
- is duplicated by
-
CONFSERVER-81045 Upgrade Apache Commons-text for CVE-2022-42889 - DUPLICATED
- Closed
- is related to
-
CWD-5892 Upgrade Apache Commons-text for CVE-2022-42889
- Closed
- relates to
-
JRASERVER-74501 Upgrade Apache Commons-text for CVE-2022-42889
- Needs Triage
- follows
-
VULN-1021427 Loading...
- mentioned in
-
Page Loading...
-
Page Loading...
-
Page Loading...
-
Page Loading...
-
Page Loading...
-
Page Loading...
-
Page Loading...
-
Page Loading...
-
Page Loading...
-
Page Loading...
-
Page Loading...
-
Page Loading...
-
Page Loading...
-
Page Loading...
-
Page Loading...
-
Page Loading...
-
Page Loading...
-
Page Loading...
-
Page Loading...
-
Page Loading...
-
Page Loading...
-
Page Loading...
-
Page Loading...
-
Page Loading...
-
Page Loading...
-
Page Loading...
-
Page Loading...
-
Page Loading...
-
Page Loading...
-
Page Loading...
-
Page Loading...
-
Page Loading...
-
Page Loading...
-
Page Loading...
-
Page Loading...
-
Page Loading...
-
Page Loading...
-
Page Loading...
-
Page Loading...
-
Page Loading...
-
Page Loading...
-
Page Loading...
-
Page Loading...
-
Page Loading...
-
Page Loading...