Miggo Logo

CVE-2022-41853: HyperSQL DataBase vulnerable to remote code execution when processing untrusted input

9.8

CVSS Score
3.1

Basic Information

EPSS Score
0.98597%
Published
10/6/2022
Updated
1/27/2023
KEV Status
No
Technology
TechnologyJava

Technical Details

CVSS Vector
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
Package NameEcosystemVulnerable VersionsFirst Patched Version
org.hsqldb:hsqldbmaven< 2.7.12.7.1

Vulnerability Intelligence
Miggo AIMiggo AI

Miggo AIRoot Cause Analysis

The critical vulnerability existed in the method access control check. The removed null check in supportsJavaMethod() indicates that pre-patch versions would automatically permit all methods when no allowlist was configured (accessibleJavaMethodNames==null). This function would appear in stack traces when processing malicious SQL method calls, as it's the security gatekeeper for Java method invocation from SQL.

Vulnerable functions

Only Mi**o us*rs **n s** t*is s**tion

WAF Protection Rules

WAF Rule

T*os* usin* `j*v*.sql.St*t*m*nt` or `j*v*.sql.Pr*p*r**St*t*m*nt` in *sql** (*yp*rSQL **t***s*) to pro**ss untrust** input m*y ** vuln*r**l* to * r*mot* *o** *x**ution *tt**k. *y ****ult it is *llow** to **ll *ny st*ti* m*t*o* o* *ny J*v* *l*ss in t**

Reasoning

T** *riti**l vuln*r**ility *xist** in t** m*t*o* ****ss *ontrol ****k. T** r*mov** null ****k in `supportsJ*v*M*t*o*()` in*i**t*s t**t pr*-p*t** v*rsions woul* *utom*ti**lly p*rmit *ll m*t*o*s w**n no *llowlist w*s *on*i*ur** (****ssi*l*J*v*M*t*o*N*m