Description
The org.h2.util.JdbcUtils.getConnection method of the H2 database takes as parameters the class name of the driver and URL of the database. An attacker may pass a JNDI driver name and a URL leading to a LDAP or RMI servers, causing remote code execution. This can be exploited through various attack vectors, most notably through the H2 Console which leads to unauthenticated remote code execution.
Published: 2022-01-07
Score: 9.8 Critical
EPSS: 91.0% High
KEV: No
Impact: n/a
Action: n/a
AI Analysis

No analysis available yet.

Remediation

No remediation available yet.

Tracking

Sign in to view the affected projects.

Advisories
Source ID Title
Debian DLA Debian DLA DLA-2923-1 h2database security update
Debian DSA Debian DSA DSA-5076-1 h2database security update
Github GHSA Github GHSA GHSA-h376-j262-vhq6 RCE in H2 Console
Ubuntu USN Ubuntu USN USN-5365-1 H2 vulnerabilities
Ubuntu USN Ubuntu USN USN-6834-1 H2 vulnerabilities
History

Tue, 25 Feb 2025 02:00:00 +0000

Type Values Removed Values Added
First Time appeared Redhat jboss Enterprise Application Platform Eus
CPEs cpe:/a:redhat:jboss_enterprise_application_platform_eus:7.3::el7
Vendors & Products Redhat jboss Enterprise Application Platform Eus

Subscriptions

Debian Debian Linux
H2database H2
Oracle Communications Cloud Native Core Policy
Redhat Camel Quarkus Jboss Enterprise Application Platform Jboss Enterprise Application Platform Eus Red Hat Single Sign On
cve-icon MITRE

Status: PUBLISHED

Assigner: JFROG

Published:

Updated: 2024-08-04T03:30:38.345Z

Reserved: 2021-10-14T00:00:00.000Z

Link: CVE-2021-42392

cve-icon Vulnrichment

No data.

cve-icon NVD

Status : Modified

Published: 2022-01-10T14:10:23.643

Modified: 2024-11-21T06:27:43.510

Link: CVE-2021-42392

cve-icon Redhat

Severity : Moderate

Publid Date: 2022-01-04T00:00:00Z

Links: CVE-2021-42392 - Bugzilla

cve-icon OpenCVE Enrichment

No data.

Weaknesses