9.8 High
CVSS3
Attack Vector
NETWORK
Attack Complexity
LOW
Privileges Required
NONE
User Interaction
NONE
Scope
UNCHANGED
Confidentiality Impact
HIGH
Integrity Impact
HIGH
Availability Impact
HIGH
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
7.5 High
CVSS2
Access Vector
NETWORK
Access Complexity
LOW
Authentication
NONE
Confidentiality Impact
PARTIAL
Integrity Impact
PARTIAL
Availability Impact
PARTIAL
AV:N/AC:L/Au:N/C:P/I:P/A:P
0.007 Low
EPSS
Percentile
79.6%
Issue Overview:
Those using java.sql.Statement or java.sql.PreparedStatement in hsqldb (HyperSQL DataBase) to process untrusted input may be vulnerable to a remote code execution attack. By default it is allowed to call any static method of any Java class in the classpath resulting in code execution. The issue can be prevented by updating to 2.7.1 or by setting the system property “hsqldb.method_class_names” to classes which are allowed to be called. For example, System.setProperty(“hsqldb.method_class_names”, “abc”) or Java argument -Dhsqldb.method_class_names=“abc” can be used. From version 2.7.1 all classes by default are not accessible except those in java.lang.Math and need to be manually enabled. (CVE-2022-41853)
Affected Packages:
hsqldb
Issue Correction:
Run yum update hsqldb to update your system.
New Packages:
noarch:
hsqldb-javadoc-1.8.1.3-1.13.amzn1.noarch
hsqldb-demo-1.8.1.3-1.13.amzn1.noarch
hsqldb-1.8.1.3-1.13.amzn1.noarch
hsqldb-manual-1.8.1.3-1.13.amzn1.noarch
src:
hsqldb-1.8.1.3-1.13.amzn1.src
Red Hat: CVE-2022-41853
Mitre: CVE-2022-41853
OS | Version | Architecture | Package | Version | Filename |
---|---|---|---|---|---|
Amazon Linux | 1 | noarch | hsqldb-javadoc | < 1.8.1.3-1.13.amzn1 | hsqldb-javadoc-1.8.1.3-1.13.amzn1.noarch.rpm |
Amazon Linux | 1 | noarch | hsqldb-demo | < 1.8.1.3-1.13.amzn1 | hsqldb-demo-1.8.1.3-1.13.amzn1.noarch.rpm |
Amazon Linux | 1 | noarch | hsqldb | < 1.8.1.3-1.13.amzn1 | hsqldb-1.8.1.3-1.13.amzn1.noarch.rpm |
Amazon Linux | 1 | noarch | hsqldb-manual | < 1.8.1.3-1.13.amzn1 | hsqldb-manual-1.8.1.3-1.13.amzn1.noarch.rpm |
9.8 High
CVSS3
Attack Vector
NETWORK
Attack Complexity
LOW
Privileges Required
NONE
User Interaction
NONE
Scope
UNCHANGED
Confidentiality Impact
HIGH
Integrity Impact
HIGH
Availability Impact
HIGH
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
7.5 High
CVSS2
Access Vector
NETWORK
Access Complexity
LOW
Authentication
NONE
Confidentiality Impact
PARTIAL
Integrity Impact
PARTIAL
Availability Impact
PARTIAL
AV:N/AC:L/Au:N/C:P/I:P/A:P
0.007 Low
EPSS
Percentile
79.6%