Home / Vulnerability Database / Config files : Text4Shell Vulnerability
Config files
Config files : Text4Shell Vulnerability
Classification
Overview
Text4Shell is a vulnerability in commons-text, a popular Java library focused on algorithms working on strings, involving the execution of random code.
The application works with data from an unverified source. An attacker can inject malicious content into this data. When the application processes data, that line could cause the vulnerable system to download and run malicious code. As a result, an attacker can potentially get full remote control over the system.
We recommend upgrading to commons-text 1.10.0 and later versions.
CRITICAL
DerScanner Severity Score
Do you want to fix Config files : Text4Shell Vulnerability in your application?
See also
Config files
Config files : Incorrect directory deletion
Config files
Config files : Code injection
Config files
