892
VMScore

CVE-2021-42392

Published: 10/01/2022 Updated: 24/02/2023
CVSS v2 Base Score: 10 | Impact Score: 10 | Exploitability Score: 10
CVSS v3 Base Score: 9.8 | Impact Score: 5.9 | Exploitability Score: 3.9
VMScore: 892
Vector: AV:N/AC:L/Au:N/C:C/I:C/A:C

Vulnerability Summary

The org.h2.util.JdbcUtils.getConnection method of the H2 database takes as parameters the class name of the driver and URL of the database. An attacker may pass a JNDI driver name and a URL leading to a LDAP or RMI servers, causing remote code execution. This can be exploited through various attack vectors, most notably through the H2 Console which leads to unauthenticated remote code execution.

Vulnerability Trend

Vulnerable Product Search on Vulmon Subscribe to Product

h2database h2

debian debian linux 9.0

debian debian linux 10.0

debian debian linux 11.0

oracle communications cloud native core policy 1.15.0

Vendor Advisories

Debian Bug report logs - #1003894 h2database: CVE-2021-42392 Package: src:h2database; Maintainer for src:h2database is Debian Java Maintainers <pkg-java-maintainers@listsaliothdebianorg>; Reported by: Salvatore Bonaccorso <carnil@debianorg> Date: Mon, 17 Jan 2022 19:42:03 UTC Severity: grave Tags: security, upstr ...
Several security issues were fixed in H2 ...
Security researchers of JFrog Security and Ismail Aydemir discovered two remote code execution vulnerabilities in the H2 Java SQL database engine which can be exploited through various attack vectors, most notably through the H2 Console and by loading custom classes from remote servers through JNDI The H2 console is a developer tool and not requir ...
Synopsis Moderate: Red Hat Single Sign-On 753 security update on RHEL 7 Type/Severity Security Advisory: Moderate Red Hat Insights patch analysis Identify and remediate systems affected by this advisory View affected systems Topic New Red Hat Single Sign-On 753 packages are now available for Red Hat Enterprise Linux 7Red Hat P ...
Synopsis Moderate: Red Hat JBoss Enterprise Application Platform 745 security update Type/Severity Security Advisory: Moderate Topic A security update is now available for Red Hat JBoss Enterprise Application Platform 74Red Hat Product Security has rated this update as having a security impact of Moderate A Common Vulnerability Scoring S ...
Synopsis Moderate: Red Hat JBoss Enterprise Application Platform 745 security update on RHEL 8 Type/Severity Security Advisory: Moderate Red Hat Insights patch analysis Identify and remediate systems affected by this advisory View affected systems Topic A security update is now available for Red Hat JBoss Enterprise Application P ...
Synopsis Moderate: Red Hat JBoss Enterprise Application Platform 745 security update on RHEL 7 Type/Severity Security Advisory: Moderate Red Hat Insights patch analysis Identify and remediate systems affected by this advisory View affected systems Topic A security update is now available for Red Hat JBoss Enterprise Application P ...
Synopsis Moderate: Red Hat Integration Camel Extensions for Quarkus 221 security update Type/Severity Security Advisory: Moderate Topic A security update to Red Hat Integration Camel Extensions for Quarkus 22 is now available The purpose of this text-only errata is to inform you about the security issues fixedRed Hat Product Security has ...
Synopsis Moderate: Red Hat Single Sign-On 761 security update Type/Severity Security Advisory: Moderate Topic A security update is now available for Red Hat Single Sign-On 76 from the Customer PortalRed Hat Product Security has rated this update as having a security impact of Moderate A Common Vulnerability Scoring System (CVSS) base sco ...
Synopsis Moderate: Red Hat Single Sign-On 753 security update Type/Severity Security Advisory: Moderate Topic A security update is now available for Red Hat Single Sign-On 75 from the Customer PortalRed Hat Product Security has rated this update as having a security impact of Moderate A Common Vulnerability Scoring System (CVSS) base sco ...
Synopsis Moderate: Red Hat Single Sign-On 761 security update on RHEL 9 Type/Severity Security Advisory: Moderate Red Hat Insights patch analysis Identify and remediate systems affected by this advisory View affected systems Topic New Red Hat Single Sign-On 761 packages are now available for Red Hat Enterprise Linux 9Red Hat P ...
Synopsis Moderate: Red Hat Single Sign-On 761 security update on RHEL 8 Type/Severity Security Advisory: Moderate Red Hat Insights patch analysis Identify and remediate systems affected by this advisory View affected systems Topic New Red Hat Single Sign-On 761 packages are now available for Red Hat Enterprise Linux 8Red Hat P ...
Synopsis Moderate: Red Hat Single Sign-On 761 security update on RHEL 7 Type/Severity Security Advisory: Moderate Red Hat Insights patch analysis Identify and remediate systems affected by this advisory View affected systems Topic New Red Hat Single Sign-On 761 packages are now available for Red Hat Enterprise Linux 7Red Hat P ...
Synopsis Moderate: Red Hat Single Sign-On 753 security update on RHEL 8 Type/Severity Security Advisory: Moderate Red Hat Insights patch analysis Identify and remediate systems affected by this advisory View affected systems Topic New Red Hat Single Sign-On 753 packages are now available for Red Hat Enterprise Linux 8Red Hat P ...
The orgh2utilJdbcUtilsgetConnection method of the H2 database takes as parameters the class name of the driver and URL of the database An attacker may pass a JNDI driver name and a URL leading to a LDAP or RMI servers, causing remote code execution This can be exploited through various attack vectors, most notably through the H2 Console which ...

Github Repositories

Synchro Task SynchroTask is a lightweight library which helps to synchronize Java routines in distributed environments Synchronization is one of the most important parts in software development Programming languages offer a wide range of options to work with locks and concurrency In Java, developers can choose between low-level features, such as synchronized or methods li

Audit Dependency-Track findings and policy violations via policy as code

dtapac Audit Dependency-Track findings and policy violations via policy as code Consider this project to be a proof-of-concept It is not very sophisticated, but it gets the job done Try it in a test environment first Do not skip this step, do not run it in production without prior testing! Introduction Dependency-Track offers a fairly sophisticated auditing workflow for

Your hitman for anything JVM.

Agent 🧩 Patches 📦 Generic (wiki) Patch Description h2jndi patches CVE-2021-42392 log4jjndi patches CVE-2021-44228 📦 Sonatype (wiki) Patch Description nexusanonymize Anonymizes the 'Uploader' and 'Uploader's IP Address' on assets Library Repository: mavenCentral() Dependencies: iogithublxgaming:agent:VERSION iogit

Global Security Database (GSD) Analysis

GSD Analysis The primary goal of this analysis is to understand the data sources, structure, and counts of the Global Security Database (GSD) Replication Clone both this repository and the gsd-database repository Checkout the gsd-database commit to (gsd timestamp: 2022-05-20T05:00:05:000) replicate below results: :~/gsd-database$ git checkout d8ce33d48de2f00130e821e9828c3e04b

Generate and populate SQL tables via JPA provider

jpa-ddl Use JPA 21 to generate database tables, load initial data via SQL statements, and emit DDL statements Two versions are presented, one that uses plain Tomcat with EclipseLink bundled in the WAR file, and another one that uses TomEE with EclipseLink (this version needs EclipseLink to be manually installed) The two versions are very similar The TomEE version is a bit s

CVE-2021-42392-Detect About The script detects vulnerable H2 server for the give list of IPs, it can identify the H2 Console web pages and check for access restrictions Usage Create a file containing list of IPs and name the file IPtxt, place the 'IPtxt' and 'h2-detectpy' in a directory and execute the script Here "IPtxt" is the default filen

Encrypted storage of SQL columns using JPA and javax.crypto

jpa-crypt Store and retrieve encrypted data in SQL databases using JPA JPA 21 supports automatic table creation and generating DDL statements, so no actual SQL coding is required The encryption algorithm used is AES-GCM, which is a shorthand for the mouthful Advanced Encryption Standard -- Galois/Counter Mode, but this can easily be changed by changing a few parameters in th