Remote Code Execution (RCE) Affecting org.hsqldb:hsqldb package, versions [,2.7.1)


Severity

Recommended
0.0
high
0
10

    Threat Intelligence

    EPSS
    1.27% (86th percentile)

Do your applications use this vulnerable package?

In a few clicks we can analyze your entire application and see what components are vulnerable in your application, and suggest you quick fixes.

Test your applications
  • Snyk ID SNYK-JAVA-ORGHSQLDB-3040860
  • published 7 Oct 2022
  • disclosed 6 Oct 2022
  • credit OSS Fuzz Team

How to fix?

Upgrade org.hsqldb:hsqldb to version 2.7.1 or higher.

Overview

Affected versions of this package are vulnerable to Remote Code Execution (RCE) when using java.sql.Statement or java.sql.PreparedStatement to process untrusted input. By default, it is allowed to call any static method of any Java class in the classpath resulting in code execution.

Workaround

Users who are unable to upgrade to the fixed version can set the system property hsqldb.method_class_names to classes which are allowed to be called. For example, System.setProperty("hsqldb.method_class_names", "abc") or Java argument -Dhsqldb.method_class_names="abc" can be used.

CVSS Scores

version 3.1
Expand this section

Snyk

8 high
  • Attack Vector (AV)
    Network
  • Attack Complexity (AC)
    High
  • Privileges Required (PR)
    Low
  • User Interaction (UI)
    Required
  • Scope (S)
    Changed
  • Confidentiality (C)
    High
  • Integrity (I)
    High
  • Availability (A)
    High
Expand this section

NVD

9.8 critical
Expand this section

Red Hat

9.8 critical