The web-based admin console in H2 Database Engine through 2.1.214 can be started via the CLI with the argument -webAdminPassword, which allows the user to specify the password in cleartext for the web admin console. Consequently, a local user (or an attacker that has obtained local access through some means) would be able to discover the password by listing processes and their arguments. NOTE: the vendor states "This is not a vulnerability of H2 Console ... Passwords should never be passed on the command line and every qualified DBA or system administrator is expected to know that."
References
Link | Resource |
---|---|
https://github.com/h2database/h2database/blob/96832bf5a97cdc0adc1f2066ed61c54990d66ab5/h2/src/main/org/h2/server/web/WebServer.java#L346-L347 | Third Party Advisory |
https://sites.google.com/sonatype.com/vulnerabilities/sonatype-2022-6243 | Exploit Third Party Advisory |
Configurations
Information
Published : 2022-11-23 13:15
Updated : 2022-11-30 12:46
NVD link : CVE-2022-45868
Mitre link : CVE-2022-45868
JSON object : View
CWE
CWE-312
Cleartext Storage of Sensitive Information
Products Affected
h2database
- h2