Is RDF4J affected by CVE-2022-42889: Apache Commons Text prior to 1.10.0 allows RCE when applied to untrusted input due to insecure interpolation defaults #4318
-
Does RDF4J internally use any string interpolation which uses input from user queries? If so, is there a chance that this CVE applies? Apache Commons Text jars within the vulnerable version range found:
CVE-2022-42889: Apache Commons Text prior to 1.10.0 allows RCE when applied to untrusted input due to insecure interpolation defaults |
Beta Was this translation helpful? Give feedback.
Replies: 1 comment 1 reply
-
Since release 4.2.1, RDF4J is using commons-text 1.10.0 (see GH-4233). So unless you use a version of RDF4J older than that, it's not affected by this CVE. However even for older versions of RDF4J this is unlikely to be an issue, since (as far as I'm aware) we do not make use variable interpolation anywhere in the project. |
Beta Was this translation helpful? Give feedback.
Since release 4.2.1, RDF4J is using commons-text 1.10.0 (see GH-4233). So unless you use a version of RDF4J older than that, it's not affected by this CVE.
However even for older versions of RDF4J this is unlikely to be an issue, since (as far as I'm aware) we do not make use variable interpolation anywhere in the project.