The package com.h2database:h2 from 1.4.198 and before 2.0.202 are vulnerable to XML External Entity (XXE) Injection via the org.h2.jdbc.JdbcSQLXML class object, when it receives parsed string data from org.h2.jdbc.JdbcResultSet.getSQLXML() method. If it executes the getSource() method when the parameter is DOMSource.class it will trigger the vulnerability.
References
Link | Resource |
---|---|
https://github.com/h2database/h2database/issues/3195 | Exploit Issue Tracking Patch Third Party Advisory |
https://snyk.io/vuln/SNYK-JAVA-COMH2DATABASE-1769238 | Exploit Patch Third Party Advisory |
https://github.com/h2database/h2database/pull/3199 | Issue Tracking Patch Third Party Advisory |
https://github.com/h2database/h2database/commit/d83285fd2e48fb075780ee95badee6f5a15ea7f8%23diff-008c2e4462609982199cd83e7cf6f1d6b41296b516783f6752c44b9f15dc7bc3 | Broken Link |
https://www.oracle.com/security-alerts/cpuapr2022.html | Not Applicable |
Configurations
Information
Published : 2021-12-10 12:15
Updated : 2022-04-28 07:53
NVD link : CVE-2021-23463
Mitre link : CVE-2021-23463
JSON object : View
CWE
CWE-611
Improper Restriction of XML External Entity Reference
Products Affected
h2database
- h2