CVE-2021-42392Deserialization of Untrusted Data in Oracle Communications Cloud Native Core Console

Severity
9.8CRITICALNVD
EPSS
91.0%
top 0.36%
CISA KEV
Not in KEV
Exploit
No known exploits
Timeline
PublishedJan 10
Latest updateJun 28

Description

The org.h2.util.JdbcUtils.getConnection method of the H2 database takes as parameters the class name of the driver and URL of the database. An attacker may pass a JNDI driver name and a URL leading to a LDAP or RMI servers, causing remote code execution. This can be exploited through various attack vectors, most notably through the H2 Console which leads to unauthenticated remote code execution.

CVSS vector

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:HExploitability: 3.9 | Impact: 5.9

Affected Packages4 packages

NVDh2database/h21.1.1002.0.206+1
debiandebian/h2database< h2database 2.1.210-1 (bookworm)

Also affects: Debian Linux 10.0, 11.0, 9.0

Patches

🔴Vulnerability Details

7
OSV
h2database vulnerabilities2022-04-05
OSV
Arbitrary code execution in H2 Console2022-01-21
GHSA
Arbitrary code execution in H2 Console2022-01-21
OSV
CVE-2022-23221: H2 Console before 22022-01-19
OSV
CVE-2021-42392: The org2022-01-10

📋Vendor Advisories

7
Ubuntu
H2 vulnerabilities2024-06-13
Oracle
Oracle Oracle Communications Risk Matrix: Policy (H2) — CVE-2021-423922022-04-15
Ubuntu
H2 vulnerabilities2022-04-05
Red Hat
h2: Loading of custom classes from remote servers through JNDI2022-01-19
Red Hat
h2: Remote Code Execution in Console2022-01-04

🕵️Threat Intelligence

3
Talos
Threat Source Newsletter (Jan. 20, 2022)2022-01-20
Sentinelone
Log4j One Month On | Crimeware and Exploitation Roundup2022-01-10
Sentinelone
Log4j One Month On | Crimeware and Exploitation Roundup2022-01-10

📄Research Papers

1
arXiv
SBOM.EXE: Countering Dynamic Code Injection based on Software Bill of Materials in Java2024-06-28
CVE-2021-42392 — Deserialization of Untrusted Data | cvebase