Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

nvd логотип

CVE-2022-41853

Опубликовано: 06 окт. 2022
Источник: nvd
CVSS3: 8
CVSS3: 9.8
EPSS Высокий

Описание

Those using java.sql.Statement or java.sql.PreparedStatement in hsqldb (HyperSQL DataBase) to process untrusted input may be vulnerable to a remote code execution attack. By default it is allowed to call any static method of any Java class in the classpath resulting in code execution. The issue can be prevented by updating to 2.7.1 or by setting the system property "hsqldb.method_class_names" to classes which are allowed to be called. For example, System.setProperty("hsqldb.method_class_names", "abc") or Java argument -Dhsqldb.method_class_names="abc" can be used. From version 2.7.1 all classes by default are not accessible except those in java.lang.Math and need to be manually enabled.

Уязвимые конфигурации

Конфигурация 1
cpe:2.3:a:hsqldb:hypersql_database:*:*:*:*:*:*:*:*
Версия до 2.7.1 (исключая)
Конфигурация 2

Одно из

cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*
cpe:2.3:o:debian:debian_linux:11.0:*:*:*:*:*:*:*

EPSS

Процентиль: 99%
0.70783
Высокий

8 High

CVSS3

9.8 Critical

CVSS3

Дефекты

CWE-470
NVD-CWE-noinfo

Связанные уязвимости

CVSS3: 8
ubuntu
почти 3 года назад

Those using java.sql.Statement or java.sql.PreparedStatement in hsqldb (HyperSQL DataBase) to process untrusted input may be vulnerable to a remote code execution attack. By default it is allowed to call any static method of any Java class in the classpath resulting in code execution. The issue can be prevented by updating to 2.7.1 or by setting the system property "hsqldb.method_class_names" to classes which are allowed to be called. For example, System.setProperty("hsqldb.method_class_names", "abc") or Java argument -Dhsqldb.method_class_names="abc" can be used. From version 2.7.1 all classes by default are not accessible except those in java.lang.Math and need to be manually enabled.

CVSS3: 9.8
redhat
почти 3 года назад

Those using java.sql.Statement or java.sql.PreparedStatement in hsqldb (HyperSQL DataBase) to process untrusted input may be vulnerable to a remote code execution attack. By default it is allowed to call any static method of any Java class in the classpath resulting in code execution. The issue can be prevented by updating to 2.7.1 or by setting the system property "hsqldb.method_class_names" to classes which are allowed to be called. For example, System.setProperty("hsqldb.method_class_names", "abc") or Java argument -Dhsqldb.method_class_names="abc" can be used. From version 2.7.1 all classes by default are not accessible except those in java.lang.Math and need to be manually enabled.

CVSS3: 8
debian
почти 3 года назад

Those using java.sql.Statement or java.sql.PreparedStatement in hsqldb ...

suse-cvrf
почти 3 года назад

Security update for hsqldb

suse-cvrf
почти 3 года назад

Security update for hsqldb

EPSS

Процентиль: 99%
0.70783
Высокий

8 High

CVSS3

9.8 Critical

CVSS3

Дефекты

CWE-470
NVD-CWE-noinfo