目标达成 感谢每一位支持者 — 我们达成了 100% 目标!

目标: 1000 元 · 已筹: 1000

100.0%

CVE-2026-42027— Apache OpenNLP 扩展加载器任意类实例化漏洞

EPSS 0.36% · P58
获取后续新漏洞提醒登录后订阅

一、 漏洞 CVE-2026-42027 基础信息

漏洞信息

对漏洞内容有疑问?看看神龙的深度分析是否有帮助!
查看神龙十问 ↗

尽管我们使用了先进的大模型技术,但其输出仍可能包含不准确或过时的信息。神龙努力确保数据的准确性,但请您根据实际情况进行核实和判断。

Vulnerability Title
Apache OpenNLP: Arbitrary Class Instantiation via Model Manifest in ExtensionLoader
来源: 美国国家漏洞数据库 NVD
Vulnerability Description
Arbitrary Class Instantiation via Model Manifest in Apache OpenNLP ExtensionLoader Versions Affected: before 2.5.9, before 3.0.0-M3 Description:  The ExtensionLoader.instantiateExtension(Class, String) method loads a class by its fully-qualified name via Class.forName() and invokes its no-arg constructor, with the class name sourced from the manifest.properties entry of a model archive. The existing isAssignableFrom check correctly rejects classes that are not subtypes of the expected extension interface (BaseToolFactory for factory=, ArtifactSerializer for serializer-class-*), but the check runs after Class.forName() has already loaded and initialized the named class. Class.forName() with default initialization semantics executes the target class's static initializer before returning, so an attacker who can supply a crafted model archive can cause the static initializer of any class on the classpath to run during model loading, regardless of whether that class passes the subsequent type check. Exploitation requires a class with attacker-useful side effects in its static initializer (for example, JNDI lookup, outbound network I/O, or filesystem access) to be present on the classpath, so this is not a drop-in remote code execution; however, the attack surface grows as third-party model distribution becomes more common (community model repositories, Hugging Face-style sharing), where users routinely load model files from origins they do not control. A secondary, narrower vector affects deployments that ship legitimate BaseToolFactory or ArtifactSerializer subclasses with side-effecting no-arg constructors: a malicious manifest can name such a class and force its constructor to run during model load. Mitigation:  * 2.x users should upgrade to 2.5.9. * 3.x users should upgrade to 3.0.0-M3. Note: The fix introduces a package-prefix allowlist that is consulted before Class.forName() is invoked, so the static initializer of a disallowed class is never executed. Classes under the opennlp. prefix remain permitted by default. Deployments that load models referencing factories or serializers outside opennlp.* must opt those packages in, either programmatically via ExtensionLoader.registerAllowedPackage(String) before the first model load, or by setting the OPENNLP_EXT_ALLOWED_PACKAGES system property to a comma-separated list of allowed package prefixes. Users who cannot upgrade immediately should ensure that all model files are sourced from trusted origins and should audit their classpath for classes with side-effecting static initializers or constructors, particularly any that perform JNDI lookups, network requests, or filesystem operations during class initialization.
来源: 美国国家漏洞数据库 NVD
CVSS Information
N/A
来源: 美国国家漏洞数据库 NVD
Vulnerability Type
使用外部可控制的输入来选择类或代码(不安全的反射)
来源: 美国国家漏洞数据库 NVD

受影响产品

厂商产品影响版本CPE订阅
Apache Software FoundationApache OpenNLP 0 ~ 2.5.9 -

二、漏洞 CVE-2026-42027 的公开POC

#POC 描述源链接神龙链接
AI 生成 POC高级

未找到公开 POC。

登录以生成 AI POC

三、漏洞 CVE-2026-42027 的情报信息

Please 登录 to view more intelligence information

同批安全公告 · Apache Software Foundation · 2026-05-04 · 共 17 条

CVE-2026-428109.9 CRITICALApache Polaris 通配符命名空间凭证泄露漏洞
CVE-2026-428119.9 CRITICALApache Polaris GCS凭证泄露漏洞
CVE-2026-428099.9 CRITICALApache Polaris 临时存储凭证滥用漏洞
CVE-2026-428129.9 CRITICALApache Polaris write.metadata.path 无保护漏洞
CVE-2026-40682Apache OpenNLP 字典解析 XXE 漏洞
CVE-2026-42440Apache OpenNLP 内存溢出拒绝服务漏洞
CVE-2026-40563Apache Atlas 脚本注入漏洞
CVE-2026-29169Apache HTTP Server mod_dav_lock 间接锁定崩溃漏洞
CVE-2026-23918Apache HTTP Server http2 早期重置双释放及RCE漏洞
CVE-2026-33006Apache HTTP Server mod_auth_digest 时序攻击漏洞
CVE-2026-33007Apache HTTP Server mod_authn_socache 崩溃漏洞
CVE-2026-33523Apache HTTP Server HTTP响应拆分漏洞
CVE-2026-33857Apache HTTP Server AJP获取函数边界外读漏洞
CVE-2026-34032Apache HTTP Server mod_proxy_ajp堆缓冲区过读漏洞
CVE-2026-34059Apache HTTP Server mod_proxy_ajp堆溢出与内存泄露漏洞
CVE-2026-24072Apache HTTP Server mod_rewrite 权限提升漏洞

IV. Related Vulnerabilities

V. Comments for CVE-2026-42027

暂无评论


发表评论