SmartBear/ready-api-plugins

CVE-2022-45868 (High) detected in h2-1.3.176.jar - autoclosed

mend-for-github-com opened this issue · 1 comments

CVE-2022-45868 - High Severity Vulnerability

Vulnerable Library - h2-1.3.176.jar

H2 Database Engine

Library home page: http://www.h2database.com

Path to dependency file: /ready-api-plugin-template/pom.xml

Path to vulnerable library: /home/wss-scanner/.m2/repository/com/h2database/h2/1.3.176/h2-1.3.176.jar

Dependency Hierarchy:

  • ready-api-soapui-pro-1.7.0.jar (Root Library)
    • ready-api-db-1.7.0.jar
      • h2-1.3.176.jar (Vulnerable Library)

Found in base branch: master

Vulnerability Details

The web-based admin console in H2 Database Engine through 2.1.214 can be started via the CLI with the argument -webAdminPassword, which allows the user to specify the password in cleartext for the web admin console. Consequently, a local user (or an attacker that has obtained local access through some means) would be able to discover the password by listing processes and their arguments. NOTE: the vendor states "This is not a vulnerability of H2 Console ... Passwords should never be passed on the command line and every qualified DBA or system administrator is expected to know that."

Publish Date: 2022-11-23

URL: CVE-2022-45868

CVSS 3 Score Details (7.8)

Base Score Metrics:

  • Exploitability Metrics:
    • Attack Vector: Local
    • Attack Complexity: Low
    • Privileges Required: Low
    • User Interaction: None
    • Scope: Unchanged
  • Impact Metrics:
    • Confidentiality Impact: High
    • Integrity Impact: High
    • Availability Impact: High

For more information on CVSS3 Scores, click here.

✔️ This issue was automatically closed by Mend because the vulnerable library in the specific branch(es) was either marked as ignored or it is no longer part of the Mend inventory.