Miggo Logo

CVE-2021-42392:
RCE in H2 Console

9.8

CVSS Score
3.1

Basic Information

EPSS Score
0.99653%
Published
1/6/2022
Updated
2/25/2023
KEV Status
No
Technology
TechnologyJava

Technical Details

CVSS Vector
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
Package NameEcosystemVulnerable VersionsFirst Patched Version
com.h2database:h2maven>= 1.1.100, < 2.0.2062.0.206

Vulnerability Intelligence
Miggo AIMiggo AI

Miggo AIRoot Cause Analysis

The vulnerability root cause analysis from JFrog and NVD explicitly identifies JdbcUtils.getConnection as the method that improperly handles JNDI lookups. The function's logic to check if the driver implements javax.naming.Context and then perform context.lookup(url) with unvalidated user input directly enables the JNDI injection attack vector. The H2 project's patch in 2.0.206 specifically modifies this JNDI handling behavior, confirming this function's critical role in the vulnerability.

Vulnerable functions

Only Mi**o us*rs **n s** t*is s**tion

WAF Protection Rules

WAF Rule

### Imp**t ** *onsol* in v*rsions sin** *.*.*** (****-**-**) to *.*.*** (****-**-**) in*lusiv* *llows lo**in* o* *ustom *l*ss*s *rom r*mot* s*rv*rs t*rou** JN*I. ** *onsol* *o*sn't ****pt r*mot* *onn**tions *y ****ult. I* r*mot* ****ss w*s *n**l** *

Reasoning

T** vuln*r**ility root **us* *n*lysis *rom J*ro* *n* NV* *xpli*itly i**nti*i*s `J***Utils.**t*onn**tion` *s t** m*t*o* t**t improp*rly **n*l*s JN*I lookups. T** *un*tion's lo*i* to ****k i* t** *riv*r impl*m*nts `j*v*x.n*min*.*ont*xt` *n* t**n p*r*or