Description
The org.h2.util.JdbcUtils.getConnection method of the H2 database takes as parameters the class name of the driver and URL of the database. An attacker may pass a JNDI driver name and a URL leading to a LDAP or RMI servers, causing remote code execution. This can be exploited through various attack vectors, most notably through the H2 Console which leads to unauthenticated remote code execution.
Exploits (2)
References (7)
Core 7
Core References
Mailing List, Third Party Advisory mailing-list
https://lists.debian.org/debian-lts-announce/2022/02/msg00017.html
Third Party Advisory vendor-advisory
https://www.debian.org/security/2022/dsa-5076
Mitigation, Third Party Advisory
https://github.com/h2database/h2database/security/advisories/GHSA-h376-j262-vhq6
Exploit, Technical Description, Vendor Advisory
https://jfrog.com/blog/the-jndi-strikes-back-unauthenticated-rce-in-h2-database-console/
Third Party Advisory
https://security.netapp.com/advisory/ntap-20220119-0001/
Patch, Third Party Advisory
https://www.oracle.com/security-alerts/cpuapr2022.html
Scores
CVSS v3
9.8
EPSS
0.9059
EPSS Percentile
99.6%
Attack Vector
NETWORK
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
Details
CWE
CWE-502
Status
published
Products (6)
com.h2database/h2
1.1.100 - 2.0.206Maven
debian/debian_linux
9.0
debian/debian_linux
10.0
debian/debian_linux
11.0
h2database/h2
1.1.000 - 2.0.204
oracle/communications_cloud_native_core_policy
1.15.0
Published
Jan 10, 2022
Tracked Since
Feb 18, 2026