First published: Wed Nov 23 2022(Updated: )
** DISPUTED ** The web-based admin console in H2 Database Engine through 2.1.214 can be started via the CLI with the argument -webAdminPassword, which allows the user to specify the password in cleartext for the web admin console. Consequently, a local user (or an attacker that has obtained local access through some means) would be able to discover the password by listing processes and their arguments. NOTE: the vendor states "This is not a vulnerability of H2 Console ... Passwords should never be passed on the command line and every qualified DBA or system administrator is expected to know that."
Credit: cve@mitre.org cve@mitre.org cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
H2database H2 | <=2.1.214 | |
maven/com.h2database:h2 | >=1.4.198<2.2.220 | 2.2.220 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The vulnerability ID of this H2 Database Engine vulnerability is CVE-2022-45868.
The severity rating of CVE-2022-45868 is high (CVSS score: 7.8).
The web-based admin console in H2 Database Engine can be started via the CLI with the argument -webAdminPassword.
Yes, CVE-2022-45868 allows the user to specify the password for the web admin console in cleartext.
Yes, a fix for CVE-2022-45868 is available in version 2.2.220 of H2 Database Engine.