Step 1: Payload Delivery: An attacker identifies an application using Apache Commons Text and its text-substitution API, accepting user-controlled input.
Step 2: Malicious Input Injection: The attacker crafts a malicious string containing interpolation directives designed to exploit a vulnerable interpolator (e.g., script: or dns:).
Step 3: Interpolation Trigger: The application processes the attacker's input, triggering the interpolation process.
Step 4: Code Execution: The vulnerable interpolator executes the attacker's commands or accesses external resources as specified in the malicious input.
Step 5: System Compromise: The attacker gains control of the server, potentially leading to data exfiltration, further exploitation, or denial of service.