Remote Code Execution (RCE) Affecting org.hsqldb:hsqldb package, versions [,2.7.1)


Severity

Recommended
0.0
high
0
10

CVSS assessment made by Snyk's Security Team. Learn more

Threat Intelligence

EPSS
2.5% (90th percentile)

Do your applications use this vulnerable package?

In a few clicks we can analyze your entire application and see what components are vulnerable in your application, and suggest you quick fixes.

Test your applications

Snyk Learn

Learn about Remote Code Execution (RCE) vulnerabilities in an interactive lesson.

Start learning
  • Snyk IDSNYK-JAVA-ORGHSQLDB-3040860
  • published7 Oct 2022
  • disclosed6 Oct 2022
  • creditOSS Fuzz Team

Introduced: 6 Oct 2022

CVE-2022-41853  (opens in a new tab)
CWE-94  (opens in a new tab)

How to fix?

Upgrade org.hsqldb:hsqldb to version 2.7.1 or higher.

Overview

Affected versions of this package are vulnerable to Remote Code Execution (RCE) when using java.sql.Statement or java.sql.PreparedStatement to process untrusted input. By default, it is allowed to call any static method of any Java class in the classpath resulting in code execution.

Workaround

Users who are unable to upgrade to the fixed version can set the system property hsqldb.method_class_names to classes which are allowed to be called. For example, System.setProperty("hsqldb.method_class_names", "abc") or Java argument -Dhsqldb.method_class_names="abc" can be used.

CVSS Scores

version 3.1