|
|||
Rule General Information |
---|
Release Date: | 2024-09-03 | |
Rule Name: | H2 Database Console JdbcUtils JNDI Injection Vulnerability (CVE-2021-42392) | |
Severity: | ||
CVE ID: | ||
Rule Protection Details |
---|
Description: | The org.h2.util.JdbcUtils.getConnection method of the H2 database takes as parameters the class name of the driver and URL of the database. An attacker may pass a JNDI driver name and a URL leading to a LDAP or RMI servers, causing remote code execution. This can be exploited through various attack vectors, most notably through the H2 Console which leads to unauthenticated remote code execution. | |
Impact: | An attacker could exploit this vulnerability to have unspecified effect. | |
Affected OS: | Windows, Linux, Others | |
Reference: | https://github.com/h2database/h2database/security/advisories/GHSA-h376-j262-vhq6 https://jfrog.com/blog/the-jndi-strikes-back-unauthenticated-rce-in-h2-database-console/ https://lists.debian.org/debian-lts-announce/2022/02/msg00017.html https://security.netapp.com/advisory/ntap-20220119-0001/ |
|
Solutions |
---|
Refer to the announcement or patch by the vendor: https://github.com/h2database/h2database/security/advisories/GHSA-h376-j262-vhq6 |