CVE-2021-42392:
RCE in H2 Console
9.8
CVSS Score
3.1
Basic Information
CVE ID
GHSA ID
EPSS Score
0.99653%
CWE
Published
1/6/2022
Updated
2/25/2023
KEV Status
No
Technology
Java
Technical Details
CVSS Vector
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
Package Name | Ecosystem | Vulnerable Versions | First Patched Version |
---|---|---|---|
com.h2database:h2 | maven | >= 1.1.100, < 2.0.206 | 2.0.206 |
Vulnerability Intelligence
Miggo AI
Root Cause Analysis
The vulnerability root cause analysis from JFrog and NVD explicitly identifies JdbcUtils.getConnection
as the method that improperly handles JNDI lookups. The function's logic to check if the driver implements javax.naming.Context
and then perform context.lookup(url)
with unvalidated user input directly enables the JNDI injection attack vector. The H2
project's patch in 2.0.206
specifically modifies this JNDI handling behavior, confirming this function's critical role in the vulnerability.