6.4
CVSSv2

CVE-2021-23463

Published: 10/12/2021 Updated: 18/08/2023
CVSS v2 Base Score: 6.4 | Impact Score: 4.9 | Exploitability Score: 10
CVSS v3 Base Score: 9.1 | Impact Score: 5.2 | Exploitability Score: 3.9
VMScore: 571
Vector: AV:N/AC:L/Au:N/C:P/I:N/A:P

Vulnerability Summary

The package com.h2database:h2 from 1.4.198 and prior to 2.0.202 are vulnerable to XML External Entity (XXE) Injection via the org.h2.jdbc.JdbcSQLXML class object, when it receives parsed string data from org.h2.jdbc.JdbcResultSet.getSQLXML() method. If it executes the getSource() method when the parameter is DOMSource.class it will trigger the vulnerability.

Vulnerability Trend

Vulnerable Product Search on Vulmon Subscribe to Product

h2database h2

Github Repositories

Apache POI for JPHP! WARNING this product use Log4J Package from maven (Apache Log4j Core » 2171) Vulnerabilities from dependencies: CVE-2021-42550 CVE-2021-4104 CVE-2021-23463 CVE-2019-17571

h2-jdbc(https://github.com/h2database/h2database/issues/3195) & mysql-jdbc(CVE-2021-2471) SQLXML XXE vulnerability reproduction.

jdbc-sqlxml-xxe h2-jdbc (CVE-2021-23463) (h2database/h2database#3195) SQLXML XXE vulnerability reproduction mysql-jdbc (CVE-2021-2471) SQLXML XXE vulnerability reproduction