CVE-2021-23463

Published: Dic 10, 2021 Last Modified: Nov 21, 2024 EU-VD ID: EUVD-2021-2477 Aliases: GHSA-7rpj-hg47-cx62
ExploitDB:
Other exploit source:
Google Dorks:
HIGH 8,1
Attack Vector: network
Attack Complexity: low
Privileges Required: low
User Interaction: none
Scope: unchanged
Confidentiality: high
Integrity: none
Availability: high
MEDIUM 6,4
Access Vector: network
Access Complexity: low
Authentication: none
Confidentiality: partial
Integrity: none
Availability: partial

Description

AI Translation Available

The package com.h2database:h2 from 1.4.198 and before 2.0.202 are vulnerable to XML External Entity (XXE) Injection via the org.h2.jdbc.JdbcSQLXML class object, when it receives parsed string data from org.h2.jdbc.JdbcResultSet.getSQLXML() method. If it executes the getSource() method when the parameter is DOMSource.class it will trigger the vulnerability.

EPSS (Exploit Prediction Scoring System)

Trend Analysis

EPSS (Exploit Prediction Scoring System)

Prevede la probabilità di sfruttamento basata su intelligence sulle minacce e sulle caratteristiche della vulnerabilità.

EPSS Score
0,0038
Percentile
0,6th
Updated

EPSS Score Trend (Last 90 Days)

611

Improper Restriction of XML External Entity Reference

Draft
Common Consequences
Security Scopes Affected:
Confidentiality Integrity Availability
Potential Impacts:
Read Application Data Read Files Or Directories Bypass Protection Mechanism Dos: Resource Consumption (Cpu) Dos: Resource Consumption (Memory)
Applicable Platforms
Languages: Not Language-Specific, XML
Technologies: Not Technology-Specific, Web Based
View CWE Details
Application

H2 by H2Database

Version Range Affected
From 1.4.198 (inclusive)
To 2.0.202 (exclusive)
cpe:2.3:a:h2database:h2:*:*:*:*:*:*:*:*
Common Platform Enumeration - Standardized vulnerability identification
https://github.com/h2database/h2database/commit/d83285fd2e48fb075780ee95badee6f…
https://github.com/h2database/h2database/issues/3195
Exploit Issue Tracking Patch Third Party Advisory
https://github.com/h2database/h2database/issues/3195
https://github.com/h2database/h2database/pull/3199
Issue Tracking Patch Third Party Advisory
https://github.com/h2database/h2database/pull/3199
https://security.netapp.com/advisory/ntap-20230818-0010/
https://snyk.io/vuln/SNYK-JAVA-COMH2DATABASE-1769238
https://www.oracle.com/security-alerts/cpuapr2022.html
https://github.com/h2database/h2database/commit/d83285fd2e48fb075780ee95badee6f…
https://github.com/h2database/h2database/issues/3195
Exploit Issue Tracking Patch Third Party Advisory
https://github.com/h2database/h2database/issues/3195
https://github.com/h2database/h2database/pull/3199
Issue Tracking Patch Third Party Advisory
https://github.com/h2database/h2database/pull/3199
https://security.netapp.com/advisory/ntap-20230818-0010/
https://snyk.io/vuln/SNYK-JAVA-COMH2DATABASE-1769238
https://www.oracle.com/security-alerts/cpuapr2022.html