Home / Vulnerability Database / Config files : Text4Shell Vulnerability
Config files

Config files : Text4Shell Vulnerability

Overview

Text4Shell is a vulnerability in commons-text, a popular Java library focused on algorithms working on strings, involving the execution of random code.

The application works with data from an unverified source. An attacker can inject malicious content into this data. When the application processes data, that line could cause the vulnerable system to download and run malicious code. As a result, an attacker can potentially get full remote control over the system.

We recommend upgrading to commons-text 1.10.0 and later versions.

CRITICAL

DerScanner Severity Score

Do you want to fix Config files : Text4Shell Vulnerability in your application?

See also

Config files

Config files : Incorrect directory deletion

Config files

Config files : Code injection

Config files

Config files : Accidental glob extension