Staging Environment: Content and features may be unstable or change without notice.
Search for packages
Package details: pkg:deb/debian/commons-configuration2@2.2-1%2Bdeb10u1
purl pkg:deb/debian/commons-configuration2@2.2-1%2Bdeb10u1
Next non-vulnerable version 2.11.0-2
Latest non-vulnerable version 2.11.0-2
Risk 10.0
Vulnerabilities affecting this package (2)
Vulnerability Summary Fixed by
VCID-cy9f-u66u-6ben
Aliases:
CVE-2020-1953
GHSA-7qx4-pp76-vrqh
Remote code execution in Apache Commons Configuration Apache Commons Configuration uses a third-party library to parse YAML files which by default allows the instantiation of classes if the YAML includes special statements. Apache Commons Configuration versions 2.2, 2.3, 2.4, 2.5, 2.6 did not change the default settings of this library. So if a YAML file was loaded from an untrusted source, it could therefore load and execute code out of the control of the host application.
2.8.0-1~deb11u1
Affected by 2 other vulnerabilities.
VCID-mbst-3bec-ykcq
Aliases:
CVE-2022-33980
GHSA-xj57-8qj4-c4m6
Code injection in Apache Commons Configuration Apache Commons Configuration performs variable interpolation, allowing properties to be dynamically evaluated and expanded. The standard format for interpolation is "${prefix:name}", where "prefix" is used to locate an instance of org.apache.commons.configuration2.interpol.Lookup that performs the interpolation. Starting with version 2.4 and continuing through 2.7, the set of default Lookup instances included interpolators that could result in arbitrary code execution or contact with remote servers. These lookups are: - "script" - execute expressions using the JVM script execution engine (javax.script) - "dns" - resolve dns records - "url" - load values from urls, including from remote servers Applications using the interpolation defaults in the affected versions may be vulnerable to remote code execution or unintentional contact with remote servers if untrusted configuration values are used. Users are recommended to upgrade to Apache Commons Configuration 2.8.0, which disables the problematic interpolators by default.
2.8.0-1~deb11u1
Affected by 2 other vulnerabilities.
Vulnerabilities fixed by this package (0)
Vulnerability Summary Aliases
This package is not known to fix vulnerabilities.

Date Actor Action Vulnerability Source VulnerableCode Version
2026-04-15T23:20:07.311323+00:00 Debian Oval Importer Affected by VCID-mbst-3bec-ykcq https://www.debian.org/security/oval/oval-definitions-bullseye.xml.bz2 38.4.0
2026-04-15T21:21:56.705282+00:00 Debian Oval Importer Affected by VCID-cy9f-u66u-6ben https://www.debian.org/security/oval/oval-definitions-bullseye.xml.bz2 38.4.0
2026-04-11T22:55:43.656085+00:00 Debian Oval Importer Affected by VCID-mbst-3bec-ykcq https://www.debian.org/security/oval/oval-definitions-bullseye.xml.bz2 38.3.0
2026-04-11T21:01:28.341397+00:00 Debian Oval Importer Affected by VCID-cy9f-u66u-6ben https://www.debian.org/security/oval/oval-definitions-bullseye.xml.bz2 38.3.0
2026-04-08T22:30:04.226013+00:00 Debian Oval Importer Affected by VCID-mbst-3bec-ykcq https://www.debian.org/security/oval/oval-definitions-bullseye.xml.bz2 38.1.0
2026-04-08T20:40:46.126120+00:00 Debian Oval Importer Affected by VCID-cy9f-u66u-6ben https://www.debian.org/security/oval/oval-definitions-bullseye.xml.bz2 38.1.0