{"id":25620,"date":"2022-10-24T17:09:48","date_gmt":"2022-10-24T17:09:48","guid":{"rendered":"https:\/\/www.esecurityplanet.com\/?p=25620"},"modified":"2022-10-24T17:09:50","modified_gmt":"2022-10-24T17:09:50","slug":"text4shell-vulnerability","status":"publish","type":"post","link":"https:\/\/www.esecurityplanet.com\/threats\/text4shell-vulnerability\/","title":{"rendered":"Time-Consuming Remediation: Assessing the Impact of Text4Shell"},"content":{"rendered":"\n<p>Security researcher Alvaro Mu\u00f1oz recently <a href=\"https:\/\/securitylab.github.com\/advisories\/GHSL-2022-018_Apache_Commons_Text\/\" target=\"_blank\" rel=\"noreferrer noopener\">warned<\/a> of a critical vulnerability in versions 1.5 through 1.9 of Apache Commons Text. The flaw, dubbed &#8220;Text4Shell&#8221; and identified as <a href=\"https:\/\/nvd.nist.gov\/vuln\/detail\/CVE-2022-42889\" target=\"_blank\" rel=\"noreferrer noopener\">CVE-2022-42889<\/a>, can enable remote code execution via the StringSubstitutor API. In response, version 1.10 was released, which disables script interpolation by default.<\/p>\n\n\n\n<p>While the flaw carries a very high severity rating of 9.8 and its name suggests a similarity to the dreaded <a href=\"https:\/\/www.esecurityplanet.com\/threats\/log4j-vulnerability-ai-big-data-threat\/\" target=\"_blank\" rel=\"noreferrer noopener\">Log4Shell<\/a> vulnerability, Rapid7 researcher Erick Galinkin <a href=\"https:\/\/www.rapid7.com\/blog\/post\/2022\/10\/17\/cve-2022-42889-keep-calm-and-stop-saying-4shell\/\" target=\"_blank\" rel=\"noreferrer noopener\">suggested<\/a> it&#8217;s an unfair comparison. &#8220;The nature of the vulnerability means that unlike Log4Shell, it will be rare that an application uses the vulnerable component of Commons Text to process untrusted, potentially malicious input,&#8221; he wrote.<\/p>\n\n\n\n<p>WordPress security company Wordfence has detected malicious actors <a href=\"https:\/\/www.wordfence.com\/blog\/2022\/10\/threat-advisory-monitoring-cve-2022-42889-text4shell-exploit-attempts\/\" target=\"_blank\" rel=\"noreferrer noopener\">scanning<\/a> for vulnerable installations, but the firm agreed that Text4Shell carries a much lower risk than Log4j: &#8220;the Apache Commons Text library is far less widely used in an unsafe manner and the likelihood of successful exploitation is significantly lower.&#8221;<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">Responding to Text4Shell<\/h2>\n\n\n\n<p>Varun Badhwar, CEO and co-founder of Endor Labs, said the vulnerability is concerning but unsurprising. &#8220;It&#8217;s natural and expected for developers to make mistakes while developing code, especially open source maintainers and contributors for whom this is not a full-time job,&#8221; he said.<\/p>\n\n\n\n<p>The greatest problem that Text4Shell will cause for most companies, Badhwar said, is the amount of time required to investigate and remediate the issue. &#8220;First and foremost, most organizations lack the tools to quickly discover where this dependency is being used,&#8221; he said.<\/p>\n\n\n\n<p>On that level at least, Badhwar said the comparison to Log4Shell is appropriate \u2013 the U.S. Cyber Safety Review Board&#8217;s most recent <a href=\"https:\/\/www.cisa.gov\/sites\/default\/files\/publications\/CSRB-Report-on-Log4-July-11-2022_508.pdf\" target=\"_blank\" rel=\"noreferrer noopener\">report<\/a> [PDF] on Log4Shell noted that one U.S. government cabinet-level department devoted 33,000 hours to investigating and responding to the flaw.<\/p>\n\n\n\n<p>&#8220;While we hope for the best from maintainers, end users of open source software need to invest in dependency lifecycle management solutions that can help them select appropriate dependencies, secure them efficiently, and be prepared to rapidly investigate and respond to such incidents with a high degree of automation,&#8221; Badhwar added.<\/p>\n\n\n\n<p>See the <a href=\"https:\/\/www.esecurityplanet.com\/applications\/top-code-debugging-and-code-security-tools\/\" target=\"_blank\" rel=\"noreferrer noopener\">Top Code Debugging and Code Security Tools<\/a><\/p>\n\n\n\n<h2 class=\"wp-block-heading\">Dependencies of Dependencies<\/h2>\n\n\n\n<p>Endor Labs security researcher Henrik Plate told <em>eSecurity Planet <\/em>that the obscurity of the affected dependency is the key challenge. &#8220;The general problem with vulnerabilities in open source components is that the majority don&#8217;t affect components (dependencies) that software developers use directly,&#8221; he said. &#8220;Instead, those vulnerabilities affect dependencies of dependencies that they use, which makes it really difficult for the developer to assess whether a given vulnerability really matters for the specific software he\/she develops.&#8221;<\/p>\n\n\n\n<p>In Log4Shell&#8217;s case, Plate said, the popularity of Log4j is central to the threat, since &#8220;you can find it literally everywhere.&#8221;<\/p>\n\n\n\n<p>That&#8217;s compounded by the fact that the flaw can impact systems that aren&#8217;t directly exposed to the Internet. &#8220;A malicious string or text triggering the vulnerability could be submitted by an attacker to one system, then travel through different databases and systems until it exploits a vulnerable system deep inside an organization&#8217;s network,&#8221; he said.<\/p>\n\n\n\n<p>&#8220;Log4j shines a light on the fact that often, the overhead of responding to a widespread vulnerability is more dangerous than the vulnerability itself,&#8221; Plate added.<\/p>\n\n\n\n<p>Also read: <a href=\"https:\/\/www.esecurityplanet.com\/applications\/software-supply-chain-a-risky-time-for-dependencies\/\" target=\"_blank\" rel=\"noreferrer noopener\">Software Supply Chain: A Risky Time for Dependencies<\/a><\/p>\n\n\n\n<h2 class=\"wp-block-heading\">Managing the Attack Surface<\/h2>\n\n\n\n<p>Badhwar noted in a recent <a href=\"https:\/\/www.endorlabs.com\/blog\/story-of-endorlabs\" target=\"_blank\" rel=\"noreferrer noopener\">blog post<\/a> that the average enterprise has over 40,000 open source dependencies directly downloaded by developers \u2013 and each of those dependencies brings in an average of 77 other dependencies. &#8220;This causes massive and uncontrollable sprawl, which slows development while increasing the attack surface,&#8221; he wrote.<\/p>\n\n\n\n<p>What&#8217;s more, security teams often have very little visibility into where and how that code is being used, so when a vulnerability is disclosed, determining whether or not you&#8217;re impacted can be like searching for a needle in a haystack.<\/p>\n\n\n\n<p>Plate said his company&#8217;s method of responding to issues like these is relatively unique. &#8220;The distinguishing feature of Endor Labs is to perform static code analysis to check whether the vulnerable piece of code contained in some open source component can be triggered in the context of a given software, no matter how deep the vulnerable component is hidden in the pile of dependencies,&#8221; he said.<\/p>\n\n\n\n<p>&#8220;That context information is key to giving priority to the dozens of vulnerabilities disclosed on a weekly basis, which result in hundreds and thousands of alerts, many of which must not be brought to the developer&#8217;s attention in the first place,&#8221; Plate added.<\/p>\n\n\n\n<p><strong>Further reading<\/strong>:<\/p>\n\n\n\n<ul class=\"wp-block-list\"><li><a href=\"https:\/\/www.esecurityplanet.com\/applications\/patch-management-as-a-service\/\">Is the Answer to Vulnerabilities Patch Management as a Service?<\/a><\/li><li><a href=\"https:\/\/www.esecurityplanet.com\/networks\/vulnerability-scanning-tools\/\">Best Vulnerability Scanning Tools<\/a><\/li><\/ul>\n\n\n<div id=\"ta-campaign-widget-66d6f1c8528ec-popup-wrapper\" class=\"ta-campaign-widget__popup-wrapper\">\n    \n<div\n    style=\"\n        --ta-campaign-plugin-primary: #3545ed;\n        --ta-campaign-plugin-button-text: #fff;\n        --ta-campaign-plugin-button-hover-background: #3231b4;\n        --ta-campaign-plugin-button-hover-text: #fff;\n        --ta-campaign-plugin-button-toggle-background: #3231b4;\n        --ta-campaign-plugin-button-toggle-text: #3231B4;\n    \"\n    data-ajax-url=\"https:\/\/www.esecurityplanet.com\/wp\/wp-admin\/admin-ajax.php\">\n    <div\n        id=\"ta-campaign-widget-66d6f1c8528ec\"\n        class=\"ta-campaign-widget ta-campaign-widget--popup\"\n        data-campaign-fields='{\"properties\":{\"campaign_type\":\"popup\",\"campaign_category\":false,\"sailthru_list\":[\"cybersecurity-insider\"],\"popup_type\":\"exit_intent\",\"appearance\":{\"colors\":{\"primary_color\":\"#3545ed\",\"button\":{\"button_text_color\":\"#fff\",\"hover\":{\"button_hover_background_color\":\"#3231b4\",\"button_hover_text_color\":\"#fff\"},\"toggle\":{\"button_toggle_background_color\":\"#3231b4\",\"button_toggle_text_color\":\"#3231B4\"}}},\"custom_scss\":\"\"},\"behavior\":{\"opt_in_enabled\":true},\"language\":{\"tagline\":\"Get the Free Cybersecurity Newsletter\",\"subtagline\":\"\",\"content\":\"Strengthen your organization&#39;s IT security defenses by keeping up to date on the latest cybersecurity news, solutions, and best practices. Delivered every Monday, Tuesday and Thursday\",\"email_placeholder\":\"Work Email Address\",\"opt_in\":\"By signing up to receive our newsletter, you agree to our Terms of Use and Privacy Policy. You can unsubscribe at any time.\",\"subscribe_button\":\"Subscribe\"}},\"identifier\":\"66d6f1c8528ec\",\"campaign_id\":26045,\"campaign_type\":\"popup\",\"popup_type\":\"exit_intent\",\"newsletters\":[\"cybersecurity-insider\"],\"behavior\":{\"opt_in_enabled\":true},\"appearance\":{\"colors\":{\"primary\":\"#3545ed\",\"button\":{\"text\":\"#fff\",\"hover\":{\"background\":\"#3231b4\",\"text\":\"#fff\"},\"toggle\":{\"background\":\"#3231b4\",\"text\":\"#3231B4\"}}},\"custom_css\":\"\"},\"language\":{\"tagline\":\"Get the Free Cybersecurity Newsletter\",\"subtagline\":\"\",\"content\":\"Strengthen your organization&#39;s IT security defenses by keeping up to date on the latest cybersecurity news, solutions, and best practices. Delivered every Monday, Tuesday and Thursday\",\"email_placeholder\":\"Work Email Address\",\"opt_in\":\"By signing up to receive our newsletter, you agree to our Terms of Use and Privacy Policy. You can unsubscribe at any time.\",\"subscribe_button\":\"Subscribe\"}}'>\n\n                <div class=\"ta-campaign-widget__exit\">\n            <svg class=\"w-8\" fill=\"none\" stroke=\"currentColor\" stroke-width=\"1.5\" viewBox=\"0 0 24 24\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\" aria-hidden=\"true\">\n                <path stroke-linecap=\"round\" stroke-linejoin=\"round\" d=\"M6 18L18 6M6 6l12 12\"><\/path>\n            <\/svg>\n        <\/div>\n        \n        <div class=\"ta-campaign-widget__wrapper\">\n            <div class=\"ta-campaign-widget__header mb-6\">\n                                <h3 class=\"ta-campaign-widget__tagline\">\n                    Get the Free Cybersecurity Newsletter                <\/h3>\n                \n                \n                                <p class=\"ta-campaign-widget__content mt-6\">\n                    Strengthen your organization's IT security defenses by keeping up to date on the latest cybersecurity news, solutions, and best practices. Delivered every Monday, Tuesday and Thursday                <\/p>\n                            <\/div>\n\n            <form class=\"ta-campaign-widget__form\">\n                <div class=\"ta-campaign-widget__input mb-4\"  data-field=\"email\">\n                    <label\n                        class=\"sr-only\"\n                        for=\"email-66d6f1c8528ec\">\n                        Email Address\n                    <\/label>\n                    <input\n                        class=\"ta-campaign-widget__input__text\"\n                        placeholder=\"Work Email Address\"\n                        id=\"email-66d6f1c8528ec\"\n                        name=\"email\"\n                        type=\"email\">\n                <\/div>\n\n                                <div class=\"ta-campaign-widget__checkbox mb-4\" data-field=\"opt_in\">\n                    <div class=\"flex items-start\">\n                        <input\n                            id=\"opt-in-66d6f1c8528ec\"\n                            class=\"ta-campaign-widget__checkbox__input mr-2\"\n                            name=\"opt-in\"\n                            type=\"checkbox\"\/>\n                        <label\n                            class=\"ta-campaign-widget__checkbox__label\"\n                            for=\"opt-in-66d6f1c8528ec\">\n                            By signing up to receive our newsletter, you agree to our Terms of Use and Privacy Policy. You can unsubscribe at any time.                        <\/label>\n                    <\/div>\n                <\/div>\n                \n                <button class=\"ta-campaign-widget__button\" type=\"submit\" >\n                    Subscribe                <\/button>\n            <\/form>\n        <\/div>\n    <\/div>\n<\/div>\n\n<style>\n<\/style><\/div>\n","protected":false},"excerpt":{"rendered":"<p>Security researcher Alvaro Mu\u00f1oz recently warned of a critical vulnerability in versions 1.5 through 1.9 of Apache Commons Text. The flaw, dubbed &#8220;Text4Shell&#8221; and identified as CVE-2022-42889, can enable remote code execution via the StringSubstitutor API. In response, version 1.10 was released, which disables script interpolation by default. While the flaw carries a very high [&hellip;]<\/p>\n","protected":false},"author":166,"featured_media":25621,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"_gazelle_contributing_experts":"","footnotes":""},"categories":[15],"tags":[2369,27830,3790,3414,23281,730,2771,31944,4218,22929,5277],"b2b_audience":[33,35],"b2b_industry":[],"b2b_product":[382,31780,85,31775],"class_list":["post-25620","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-threats","tag-cloud-security","tag-code-security","tag-cybersecurity","tag-network-security","tag-open-source-security","tag-security","tag-software-development","tag-software-supply-chain","tag-vulnerabilities","tag-vulnerability-management","tag-web-security","b2b_audience-awareness-and-consideration","b2b_audience-implementation-and-support","b2b_product-application-security-vulnerability-management","b2b_product-patch-management","b2b_product-testing-debugging-and-qa","b2b_product-web-applications-security"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v22.9 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>Time-Consuming Remediation: Assessing the Impact of Text4Shell | eSecurity Planet<\/title>\n<meta name=\"description\" content=\"While the Text4Shell vulnerability is far less dangerous than Log4j, it still highlights the dangers of software dependencies.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.esecurityplanet.com\/threats\/text4shell-vulnerability\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Time-Consuming Remediation: Assessing the Impact of Text4Shell | eSecurity Planet\" \/>\n<meta property=\"og:description\" content=\"While the Text4Shell vulnerability is far less dangerous than Log4j, it still highlights the dangers of software dependencies.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.esecurityplanet.com\/threats\/text4shell-vulnerability\/\" \/>\n<meta property=\"og:site_name\" content=\"eSecurity Planet\" \/>\n<meta property=\"article:published_time\" content=\"2022-10-24T17:09:48+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2022-10-24T17:09:50+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/assets.esecurityplanet.com\/uploads\/2022\/10\/apache-commons-text.png\" \/>\n\t<meta property=\"og:image:width\" content=\"311\" \/>\n\t<meta property=\"og:image:height\" content=\"162\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/png\" \/>\n<meta name=\"author\" content=\"Jeff Goldman\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@eSecurityPlanet\" \/>\n<meta name=\"twitter:site\" content=\"@eSecurityPlanet\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Jeff Goldman\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"4 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/www.esecurityplanet.com\/threats\/text4shell-vulnerability\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.esecurityplanet.com\/threats\/text4shell-vulnerability\/\"},\"author\":{\"name\":\"Jeff Goldman\",\"@id\":\"https:\/\/www.esecurityplanet.com\/#\/schema\/person\/814377f0182cc43200a4581fba4ec795\"},\"headline\":\"Time-Consuming Remediation: Assessing the Impact of Text4Shell\",\"datePublished\":\"2022-10-24T17:09:48+00:00\",\"dateModified\":\"2022-10-24T17:09:50+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.esecurityplanet.com\/threats\/text4shell-vulnerability\/\"},\"wordCount\":789,\"publisher\":{\"@id\":\"https:\/\/www.esecurityplanet.com\/#organization\"},\"image\":{\"@id\":\"https:\/\/www.esecurityplanet.com\/threats\/text4shell-vulnerability\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/assets.esecurityplanet.com\/uploads\/2022\/10\/apache-commons-text.png\",\"keywords\":[\"cloud security\",\"code security\",\"cybersecurity\",\"network security\",\"open source security\",\"security\",\"software development\",\"software supply chain\",\"vulnerabilities\",\"Vulnerability Management\",\"Web security\"],\"articleSection\":[\"Threats\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.esecurityplanet.com\/threats\/text4shell-vulnerability\/\",\"url\":\"https:\/\/www.esecurityplanet.com\/threats\/text4shell-vulnerability\/\",\"name\":\"Time-Consuming Remediation: Assessing the Impact of Text4Shell | eSecurity Planet\",\"isPartOf\":{\"@id\":\"https:\/\/www.esecurityplanet.com\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.esecurityplanet.com\/threats\/text4shell-vulnerability\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/www.esecurityplanet.com\/threats\/text4shell-vulnerability\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/assets.esecurityplanet.com\/uploads\/2022\/10\/apache-commons-text.png\",\"datePublished\":\"2022-10-24T17:09:48+00:00\",\"dateModified\":\"2022-10-24T17:09:50+00:00\",\"description\":\"While the Text4Shell vulnerability is far less dangerous than Log4j, it still highlights the dangers of software dependencies.\",\"breadcrumb\":{\"@id\":\"https:\/\/www.esecurityplanet.com\/threats\/text4shell-vulnerability\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.esecurityplanet.com\/threats\/text4shell-vulnerability\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.esecurityplanet.com\/threats\/text4shell-vulnerability\/#primaryimage\",\"url\":\"https:\/\/assets.esecurityplanet.com\/uploads\/2022\/10\/apache-commons-text.png\",\"contentUrl\":\"https:\/\/assets.esecurityplanet.com\/uploads\/2022\/10\/apache-commons-text.png\",\"width\":311,\"height\":162,\"caption\":\"apache commons text\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.esecurityplanet.com\/threats\/text4shell-vulnerability\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.esecurityplanet.com\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Time-Consuming Remediation: Assessing the Impact of Text4Shell\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.esecurityplanet.com\/#website\",\"url\":\"https:\/\/www.esecurityplanet.com\/\",\"name\":\"eSecurity Planet\",\"description\":\"Industry-leading guidance and analysis for how to keep your business secure.\",\"publisher\":{\"@id\":\"https:\/\/www.esecurityplanet.com\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.esecurityplanet.com\/?s={search_term_string}\"},\"query-input\":\"required name=search_term_string\"}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.esecurityplanet.com\/#organization\",\"name\":\"eSecurityPlanet\",\"url\":\"https:\/\/www.esecurityplanet.com\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.esecurityplanet.com\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/assets.esecurityplanet.com\/uploads\/2020\/10\/eSecurity_logo_MainLogo.png\",\"contentUrl\":\"https:\/\/assets.esecurityplanet.com\/uploads\/2020\/10\/eSecurity_logo_MainLogo.png\",\"width\":1134,\"height\":375,\"caption\":\"eSecurityPlanet\"},\"image\":{\"@id\":\"https:\/\/www.esecurityplanet.com\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/x.com\/eSecurityPlanet\"]},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.esecurityplanet.com\/#\/schema\/person\/814377f0182cc43200a4581fba4ec795\",\"name\":\"Jeff Goldman\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.esecurityplanet.com\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/assets.esecurityplanet.com\/uploads\/2021\/08\/jeff-goldman-150x150.jpg\",\"contentUrl\":\"https:\/\/assets.esecurityplanet.com\/uploads\/2021\/08\/jeff-goldman-150x150.jpg\",\"caption\":\"Jeff Goldman\"},\"description\":\"eSecurity Planet contributor Jeff Goldman has been a technology journalist for more than 20 years and an eSecurity Planet contributor since 2009. He's also written extensively about wireless and broadband infrastructure and semiconductor engineering. He started his career at MTV, but soon decided that technology writing was a more promising path.\",\"url\":\"https:\/\/www.esecurityplanet.com\/author\/jeff-goldman\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Time-Consuming Remediation: Assessing the Impact of Text4Shell | eSecurity Planet","description":"While the Text4Shell vulnerability is far less dangerous than Log4j, it still highlights the dangers of software dependencies.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.esecurityplanet.com\/threats\/text4shell-vulnerability\/","og_locale":"en_US","og_type":"article","og_title":"Time-Consuming Remediation: Assessing the Impact of Text4Shell | eSecurity Planet","og_description":"While the Text4Shell vulnerability is far less dangerous than Log4j, it still highlights the dangers of software dependencies.","og_url":"https:\/\/www.esecurityplanet.com\/threats\/text4shell-vulnerability\/","og_site_name":"eSecurity Planet","article_published_time":"2022-10-24T17:09:48+00:00","article_modified_time":"2022-10-24T17:09:50+00:00","og_image":[{"width":311,"height":162,"url":"https:\/\/assets.esecurityplanet.com\/uploads\/2022\/10\/apache-commons-text.png","type":"image\/png"}],"author":"Jeff Goldman","twitter_card":"summary_large_image","twitter_creator":"@eSecurityPlanet","twitter_site":"@eSecurityPlanet","twitter_misc":{"Written by":"Jeff Goldman","Est. reading time":"4 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.esecurityplanet.com\/threats\/text4shell-vulnerability\/#article","isPartOf":{"@id":"https:\/\/www.esecurityplanet.com\/threats\/text4shell-vulnerability\/"},"author":{"name":"Jeff Goldman","@id":"https:\/\/www.esecurityplanet.com\/#\/schema\/person\/814377f0182cc43200a4581fba4ec795"},"headline":"Time-Consuming Remediation: Assessing the Impact of Text4Shell","datePublished":"2022-10-24T17:09:48+00:00","dateModified":"2022-10-24T17:09:50+00:00","mainEntityOfPage":{"@id":"https:\/\/www.esecurityplanet.com\/threats\/text4shell-vulnerability\/"},"wordCount":789,"publisher":{"@id":"https:\/\/www.esecurityplanet.com\/#organization"},"image":{"@id":"https:\/\/www.esecurityplanet.com\/threats\/text4shell-vulnerability\/#primaryimage"},"thumbnailUrl":"https:\/\/assets.esecurityplanet.com\/uploads\/2022\/10\/apache-commons-text.png","keywords":["cloud security","code security","cybersecurity","network security","open source security","security","software development","software supply chain","vulnerabilities","Vulnerability Management","Web security"],"articleSection":["Threats"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.esecurityplanet.com\/threats\/text4shell-vulnerability\/","url":"https:\/\/www.esecurityplanet.com\/threats\/text4shell-vulnerability\/","name":"Time-Consuming Remediation: Assessing the Impact of Text4Shell | eSecurity Planet","isPartOf":{"@id":"https:\/\/www.esecurityplanet.com\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.esecurityplanet.com\/threats\/text4shell-vulnerability\/#primaryimage"},"image":{"@id":"https:\/\/www.esecurityplanet.com\/threats\/text4shell-vulnerability\/#primaryimage"},"thumbnailUrl":"https:\/\/assets.esecurityplanet.com\/uploads\/2022\/10\/apache-commons-text.png","datePublished":"2022-10-24T17:09:48+00:00","dateModified":"2022-10-24T17:09:50+00:00","description":"While the Text4Shell vulnerability is far less dangerous than Log4j, it still highlights the dangers of software dependencies.","breadcrumb":{"@id":"https:\/\/www.esecurityplanet.com\/threats\/text4shell-vulnerability\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.esecurityplanet.com\/threats\/text4shell-vulnerability\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.esecurityplanet.com\/threats\/text4shell-vulnerability\/#primaryimage","url":"https:\/\/assets.esecurityplanet.com\/uploads\/2022\/10\/apache-commons-text.png","contentUrl":"https:\/\/assets.esecurityplanet.com\/uploads\/2022\/10\/apache-commons-text.png","width":311,"height":162,"caption":"apache commons text"},{"@type":"BreadcrumbList","@id":"https:\/\/www.esecurityplanet.com\/threats\/text4shell-vulnerability\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.esecurityplanet.com\/"},{"@type":"ListItem","position":2,"name":"Time-Consuming Remediation: Assessing the Impact of Text4Shell"}]},{"@type":"WebSite","@id":"https:\/\/www.esecurityplanet.com\/#website","url":"https:\/\/www.esecurityplanet.com\/","name":"eSecurity Planet","description":"Industry-leading guidance and analysis for how to keep your business secure.","publisher":{"@id":"https:\/\/www.esecurityplanet.com\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.esecurityplanet.com\/?s={search_term_string}"},"query-input":"required name=search_term_string"}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.esecurityplanet.com\/#organization","name":"eSecurityPlanet","url":"https:\/\/www.esecurityplanet.com\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.esecurityplanet.com\/#\/schema\/logo\/image\/","url":"https:\/\/assets.esecurityplanet.com\/uploads\/2020\/10\/eSecurity_logo_MainLogo.png","contentUrl":"https:\/\/assets.esecurityplanet.com\/uploads\/2020\/10\/eSecurity_logo_MainLogo.png","width":1134,"height":375,"caption":"eSecurityPlanet"},"image":{"@id":"https:\/\/www.esecurityplanet.com\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/x.com\/eSecurityPlanet"]},{"@type":"Person","@id":"https:\/\/www.esecurityplanet.com\/#\/schema\/person\/814377f0182cc43200a4581fba4ec795","name":"Jeff Goldman","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.esecurityplanet.com\/#\/schema\/person\/image\/","url":"https:\/\/assets.esecurityplanet.com\/uploads\/2021\/08\/jeff-goldman-150x150.jpg","contentUrl":"https:\/\/assets.esecurityplanet.com\/uploads\/2021\/08\/jeff-goldman-150x150.jpg","caption":"Jeff Goldman"},"description":"eSecurity Planet contributor Jeff Goldman has been a technology journalist for more than 20 years and an eSecurity Planet contributor since 2009. He's also written extensively about wireless and broadband infrastructure and semiconductor engineering. He started his career at MTV, but soon decided that technology writing was a more promising path.","url":"https:\/\/www.esecurityplanet.com\/author\/jeff-goldman\/"}]}},"_links":{"self":[{"href":"https:\/\/www.esecurityplanet.com\/wp-json\/wp\/v2\/posts\/25620"}],"collection":[{"href":"https:\/\/www.esecurityplanet.com\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.esecurityplanet.com\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.esecurityplanet.com\/wp-json\/wp\/v2\/users\/166"}],"replies":[{"embeddable":true,"href":"https:\/\/www.esecurityplanet.com\/wp-json\/wp\/v2\/comments?post=25620"}],"version-history":[{"count":0,"href":"https:\/\/www.esecurityplanet.com\/wp-json\/wp\/v2\/posts\/25620\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.esecurityplanet.com\/wp-json\/wp\/v2\/media\/25621"}],"wp:attachment":[{"href":"https:\/\/www.esecurityplanet.com\/wp-json\/wp\/v2\/media?parent=25620"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.esecurityplanet.com\/wp-json\/wp\/v2\/categories?post=25620"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.esecurityplanet.com\/wp-json\/wp\/v2\/tags?post=25620"},{"taxonomy":"b2b_audience","embeddable":true,"href":"https:\/\/www.esecurityplanet.com\/wp-json\/wp\/v2\/b2b_audience?post=25620"},{"taxonomy":"b2b_industry","embeddable":true,"href":"https:\/\/www.esecurityplanet.com\/wp-json\/wp\/v2\/b2b_industry?post=25620"},{"taxonomy":"b2b_product","embeddable":true,"href":"https:\/\/www.esecurityplanet.com\/wp-json\/wp\/v2\/b2b_product?post=25620"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}