Skip to content

Critical Text4Shell Vulnerability Discovered, CVSS v3 Score 9.8

Text4Shell poses a significant risk with a CVSS v3 score of 9.8. Organizations must patch affected versions and monitor container environments to stay secure.

In this image we can see a poster with shells and text.
In this image we can see a poster with shells and text.

Critical Text4Shell Vulnerability Discovered, CVSS v3 Score 9.8

A new critical vulnerability, dubbed Text4Shell (CVE-2022-42889), has been discovered by researcher Alvaro Muñoz. The CVSS v3 score for this vulnerability is 9.8, indicating a highly critical threat.

Text4Shell, affecting versions 1.5 to 1.9 of Apache Commons Text, enables remote code execution (RCE) when applied to untrusted input due to insecure interpolation defaults. The vulnerability was reported to have a limited impact compared to Log4Shell or Spring4Shell-related CVEs, as the vulnerable function is less commonly used in production environments.

Qualys Container Security offers a solution to detect Text4Shell vulnerability with QID: 988179 in container environments. Their sensors typically use pattern matching for specific exploit strings related to Text4Shell in container logs, such as suspicious expressions like "${jndi:". To mitigate Text4Shell attacks, it is crucial to patch the detected vulnerable images as soon as possible. The patched version is Apache Commons Text 1.10.

Text4Shell, with a CVSS v3 score of 9.8, poses a significant risk. To protect against this vulnerability, organizations should promptly patch affected Apache Commons Text versions (1.5 to 1.9) and implement Qualys Container Security's detection solution to monitor container environments for Text4Shell-related exploit strings.

Read also:

Latest