Share
## https://sploitus.com/exploit?id=FEA5EE0D-5909-558F-8947-9AE371C51A08
# CVE-2022-42889-MASS-RCE (another LOG4SHELL)
Mass exploitation tool for CVE-2022-42889 (Apache Commons Text RCE) supports list of ips

This script is compitable with list of ips and multi threading functionality.
The cvss: 9.8/10 critical
The vulnerability not need any user interaction or authentication to trigger
A very problematic cve after log4shell, affects tons of internet facing instance
We already include a list of ips which are mostly vulnerable inside this download
With all necessary infos inside info.pdf
You can get it from here: [https://satoshidisk(.)com/pay/CGgY0N](https://bit.ly/3yOVxHA)



# details:
Apache Commons Text performs variable interpolation, allowing properties to be dynamically evaluated and expanded. 
The standard format for interpolation is "${prefix:name}", where "prefix" is used to locate an instance of org.apache.commons.text.lookup.StringLookup that performs the interpolation. 
Starting with version 1.5 and continuing through 1.9, the set of default Lookup instances included interpolators that could result in arbitrary code execution or contact with remote servers.



[![Hits](https://hits.seeyoufarm.com/api/count/incr/badge.svg?url=https%3A%2F%2Fgithub.com%2Fpr0n3d%2FCVE-2022-42889-MASS-RCE&count_bg=%2379C83D&title_bg=%23555555&icon=&icon_color=%23E7E7E7&title=Text4shell&edge_flat=false)](https://hits.seeyoufarm.com)