Oct. 24, 2022, 5:09 p.m. | Jeff Goldman

eSecurityPlanet www.esecurityplanet.com

Security researcher Alvaro Muñoz recently warned of a critical vulnerability in versions 1.5 through 1.9 of Apache Commons Text. The flaw, dubbed “Text4Shell” and identified as CVE-2022-42889, can enable remote code execution via the StringSubstitutor API. In response, version 1.10 was released, which disables script interpolation by default. While the flaw carries a very high […]


The post Time-Consuming Remediation: Assessing the Impact of Text4Shell appeared first on eSecurityPlanet.

cloud security code security consuming cybersecurity impact network security open source security remediation security software development software supply chain text4shell threats vulnerabilities vulnerability management web security

SOC 2 Manager, Audit and Certification

@ Deloitte | US and CA Multiple Locations

Digital Trust Cyber Transformation Senior

@ KPMG India | Mumbai, Maharashtra, India

Security Consultant, Assessment Services - SOC 2 | Remote US

@ Coalfire | United States

Sr. Systems Security Engineer

@ Effectual | Washington, DC

Cyber Network Engineer

@ SonicWall | Woodbridge, Virginia, United States

Security Architect

@ Nokia | Belgium