Lucene search

K
cve[email protected]CVE-2022-45136
HistoryNov 14, 2022 - 4:15 p.m.

CVE-2022-45136

2022-11-1416:15:12
CWE-502
web.nvd.nist.gov
38
12
apache jena
sdb
cve-2022-45136
jdbc
deserialization
attack
rce
eol
mysql
database security

9.8 High

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H

9.2 High

AI Score

Confidence

High

0.046 Low

EPSS

Percentile

92.6%

Apache Jena SDB 3.17.0 and earlier is vulnerable to a JDBC Deserialisation attack if the attacker is able to control the JDBC URL used or cause the underlying database server to return malicious data. The mySQL JDBC driver in particular is known to be vulnerable to this class of attack. As a result an application using Apache Jena SDB can be subject to RCE when connected to a malicious database server. Apache Jena SDB has been EOL since December 2020 and users should migrate to alternative options e.g. Apache Jena TDB 2.

Affected configurations

Vulners
NVD
Node
apachejena_sdbRange≀3.17.0
CPENameOperatorVersion
apache:jena_sdbapache jena sdble3.17.0

CNA Affected

[
  {
    "vendor": "Apache Software Foundation",
    "product": "Apache Jena SDB",
    "versions": [
      {
        "version": "unspecified",
        "lessThanOrEqual": "3.17.0",
        "status": "affected",
        "versionType": "custom"
      }
    ]
  }
]

Social References

More

9.8 High

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H

9.2 High

AI Score

Confidence

High

0.046 Low

EPSS

Percentile

92.6%