9.1 High
CVSS3
Attack Vector
NETWORK
Attack Complexity
LOW
Privileges Required
NONE
User Interaction
NONE
Scope
UNCHANGED
Confidentiality Impact
HIGH
Integrity Impact
NONE
Availability Impact
HIGH
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:H
6.4 Medium
CVSS2
Access Vector
NETWORK
Access Complexity
LOW
Authentication
NONE
Confidentiality Impact
PARTIAL
Integrity Impact
NONE
Availability Impact
PARTIAL
AV:N/AC:L/Au:N/C:P/I:N/A:P
h2 is vulnerable to XML external entity injection. The vulnerability exists due to the getSource
method executed within the DOMSource.class
input parameter when passing string data into the org.h2.jdbc.JdbcSQLXML
class, allowing an attacker to cause an application crash or access sensitive data.
CPE | Name | Operator | Version |
---|---|---|---|
h2 database engine | le | 1.4.200 | |
h2 database engine | le | 1.4.200 |
github.com/h2database/h2database/commit/d83285fd2e48fb075780ee95badee6f5a15ea7f8
github.com/h2database/h2database/commit/d83285fd2e48fb075780ee95badee6f5a15ea7f8%23diff-008c2e4462609982199cd83e7cf6f1d6b41296b516783f6752c44b9f15dc7bc3
github.com/h2database/h2database/issues/3195
github.com/h2database/h2database/pull/3199
github.com/h2database/h2database/pull/3199/commits
www.oracle.com/security-alerts/cpuapr2022.html
9.1 High
CVSS3
Attack Vector
NETWORK
Attack Complexity
LOW
Privileges Required
NONE
User Interaction
NONE
Scope
UNCHANGED
Confidentiality Impact
HIGH
Integrity Impact
NONE
Availability Impact
HIGH
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:H
6.4 Medium
CVSS2
Access Vector
NETWORK
Access Complexity
LOW
Authentication
NONE
Confidentiality Impact
PARTIAL
Integrity Impact
NONE
Availability Impact
PARTIAL
AV:N/AC:L/Au:N/C:P/I:N/A:P