cvelist/2021/23xxx/CVE-2021-23463.json
2023-08-18 14:00:34 +00:00

116 lines
4.4 KiB
JSON

{
"data_type": "CVE",
"data_format": "MITRE",
"data_version": "4.0",
"CVE_data_meta": {
"ASSIGNER": "report@snyk.io",
"DATE_PUBLIC": "2021-12-10T20:00:01.774696Z",
"ID": "CVE-2021-23463",
"STATE": "PUBLIC",
"TITLE": "XML External Entity (XXE) Injection"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "com.h2database:h2",
"version": {
"version_data": [
{
"version_affected": ">=",
"version_value": "0"
},
{
"version_affected": "<",
"version_value": "2.0.202"
}
]
}
}
]
},
"vendor_name": "n/a"
}
]
}
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "XML External Entity (XXE) Injection"
}
]
}
]
},
"references": {
"reference_data": [
{
"refsource": "MISC",
"url": "https://github.com/h2database/h2database/issues/3195",
"name": "https://github.com/h2database/h2database/issues/3195"
},
{
"refsource": "MISC",
"url": "https://snyk.io/vuln/SNYK-JAVA-COMH2DATABASE-1769238",
"name": "https://snyk.io/vuln/SNYK-JAVA-COMH2DATABASE-1769238"
},
{
"refsource": "MISC",
"url": "https://github.com/h2database/h2database/pull/3199",
"name": "https://github.com/h2database/h2database/pull/3199"
},
{
"refsource": "MISC",
"url": "https://github.com/h2database/h2database/commit/d83285fd2e48fb075780ee95badee6f5a15ea7f8%23diff-008c2e4462609982199cd83e7cf6f1d6b41296b516783f6752c44b9f15dc7bc3",
"name": "https://github.com/h2database/h2database/commit/d83285fd2e48fb075780ee95badee6f5a15ea7f8%23diff-008c2e4462609982199cd83e7cf6f1d6b41296b516783f6752c44b9f15dc7bc3"
},
{
"url": "https://www.oracle.com/security-alerts/cpuapr2022.html",
"refsource": "MISC",
"name": "https://www.oracle.com/security-alerts/cpuapr2022.html"
},
{
"refsource": "CONFIRM",
"name": "https://security.netapp.com/advisory/ntap-20230818-0010/",
"url": "https://security.netapp.com/advisory/ntap-20230818-0010/"
}
]
},
"description": {
"description_data": [
{
"lang": "eng",
"value": "The package com.h2database:h2 from 1.4.198 and before 2.0.202 are vulnerable to XML External Entity (XXE) Injection via the org.h2.jdbc.JdbcSQLXML class object, when it receives parsed string data from org.h2.jdbc.JdbcResultSet.getSQLXML() method. If it executes the getSource() method when the parameter is DOMSource.class it will trigger the vulnerability."
}
]
},
"impact": {
"cvss": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H/E:P",
"baseScore": 8.1,
"baseSeverity": "HIGH",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"availabilityImpact": "HIGH"
}
},
"credit": [
{
"lang": "eng",
"value": "threedr3am of SecCoder Security Lab"
}
]
}