The web-based admin console in H2 Database Engine through 2.1.214 can be started via the CLI with the argument -webAdminPassword, which allows the user to specify the password in cleartext for the web admin console. Consequently, a local user (or an attacker that has obtained local access through some means) would be able to discover the password by listing processes and their arguments. NOTE: the vendor states “This is not a vulnerability of H2 Console … Passwords should never be passed on the command line and every qualified DBA or system administrator is expected to know that.”.This CVE has a CVSS3.1 score of 8.4 and a Base Severity of HIGH.
Info | Details |
---|---|
CVE ID | CVE-2022-45868 |
CVE State | PUBLISHED |
BaseScore | 8.4 |
BaseSeverity | HIGH |
VectorString | CVSS:3.1/AC:L/AV:L/A:H/C:H/I:H/PR:N/S:U/UI:N |
Version | NA |
References for CVE-2022-45868 :
https://sites.google.com/sonatype.com/vulnerabilities/sonatype-2022-6243
https://github.com/h2database/h2database/blob/96832bf5a97cdc0adc1f2066ed61c54990d66ab5/h2/src/main/org/h2/server/web/WebServer.java#L346-L347
https://github.com/h2database/h2database/issues/3686
https://github.com/advisories/GHSA-22wj-vf5f-wrvj
Metric Type | Metric Score |
---|---|
AttackVector(AV) | LOCAL |
AttackComplexity(AC) | LOW |
PrivilegesRequired(PR) | NONE |
UserInteraction(UI) | NONE |
Scope(S) | UNCHANGED |
Confidentiality(C) | HIGH |
Availability(A) | HIGH |
Integrity(I) | HIGH |