Lucene search

K
githubGitHub Advisory DatabaseGHSA-22WJ-VF5F-WRVJ
HistoryNov 23, 2022 - 9:30 p.m.

Password exposure in H2 Database

2022-11-2321:30:31
CWE-200
CWE-312
GitHub Advisory Database
github.com
23
h2 database
web-based admin
cleartext password
local user access
command line argument
vulnerability
system administrator

CVSS3

8.4

Attack Vector

LOCAL

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H

EPSS

0

Percentile

5.1%

The web-based admin console in H2 Database Engine through 2.1.214 can be started via the CLI with the argument -webAdminPassword, which allows the user to specify the password in cleartext for the web admin console. Consequently, a local user (or an attacker that has obtained local access through some means) would be able to discover the password by listing processes and their arguments. NOTE: the vendor states “This is not a vulnerability of H2 Console … Passwords should never be passed on the command line and every qualified DBA or system administrator is expected to know that.”

Affected configurations

Vulners
Node
com.h2databaseh2Range1.4.1982.2.220
VendorProductVersionCPE
com.h2databaseh2*cpe:2.3:a:com.h2database:h2:*:*:*:*:*:*:*:*

CVSS3

8.4

Attack Vector

LOCAL

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H

EPSS

0

Percentile

5.1%