CVE-2022-45868 (High) detected in h2-1.3.176.jar - autoclosed
mend-for-github-com opened this issue · 1 comments
CVE-2022-45868 - High Severity Vulnerability
Vulnerable Library - h2-1.3.176.jar
H2 Database Engine
Library home page: http://www.h2database.com
Path to dependency file: /ready-api-plugin-template/pom.xml
Path to vulnerable library: /home/wss-scanner/.m2/repository/com/h2database/h2/1.3.176/h2-1.3.176.jar
Dependency Hierarchy:
- ready-api-soapui-pro-1.7.0.jar (Root Library)
- ready-api-db-1.7.0.jar
- ❌ h2-1.3.176.jar (Vulnerable Library)
- ready-api-db-1.7.0.jar
Found in base branch: master
Vulnerability Details
The web-based admin console in H2 Database Engine through 2.1.214 can be started via the CLI with the argument -webAdminPassword, which allows the user to specify the password in cleartext for the web admin console. Consequently, a local user (or an attacker that has obtained local access through some means) would be able to discover the password by listing processes and their arguments. NOTE: the vendor states "This is not a vulnerability of H2 Console ... Passwords should never be passed on the command line and every qualified DBA or system administrator is expected to know that."
Publish Date: 2022-11-23
URL: CVE-2022-45868
CVSS 3 Score Details (7.8)
Base Score Metrics:
- Exploitability Metrics:
- Attack Vector: Local
- Attack Complexity: Low
- Privileges Required: Low
- User Interaction: None
- Scope: Unchanged
- Impact Metrics:
- Confidentiality Impact: High
- Integrity Impact: High
- Availability Impact: High
✔️ This issue was automatically closed by Mend because the vulnerable library in the specific branch(es) was either marked as ignored or it is no longer part of the Mend inventory.