vulnerability
Red Hat JBossEAP: Unsafe Reflection (CVE-2022-41853)
Severity | CVSS | Published | Added | Modified |
---|---|---|---|---|
7 | (AV:N/AC:H/Au:S/C:C/I:C/A:C) | Oct 6, 2022 | Sep 19, 2024 | Dec 20, 2024 |
Severity
7
CVSS
(AV:N/AC:H/Au:S/C:C/I:C/A:C)
Published
Oct 6, 2022
Added
Sep 19, 2024
Modified
Dec 20, 2024
Description
Those using java.sql.Statement or java.sql.PreparedStatement in hsqldb (HyperSQL DataBase) to process untrusted input may be vulnerable to a remote code execution attack. By default it is allowed to call any static method of any Java class in the classpath resulting in code execution. The issue can be prevented by updating to 2.7.1 or by setting the system property "hsqldb.method_class_names" to classes which are allowed to be called. For example, System.setProperty("hsqldb.method_class_names", "abc") or Java argument -Dhsqldb.method_class_names="abc" can be used. From version 2.7.1 all classes by default are not accessible except those in java.lang.Math and need to be manually enabled.. A flaw was found in the HSQLDB package. This flaw allows untrusted inputs to execute remote code due to any static method of any Java class in the classpath, resulting in code execution by default.
Solution
red-hat-jboss-eap-upgrade-latest
References
- CVE-2022-41853
- https://attackerkb.com/topics/CVE-2022-41853
- URL-https://access.redhat.com/security/cve/CVE-2022-41853
- URL-https://bugzilla.redhat.com/show_bug.cgi?id=2136141
- URL-http://hsqldb.org/doc/2.0/guide/sqlroutines-chapt.html#src_jrt_access_control
- URL-https://github.com/advisories/GHSA-77xx-rxvh-q682
- URL-https://access.redhat.com/errata/RHSA-2023:1512
- URL-https://access.redhat.com/errata/RHSA-2023:1513
- URL-https://access.redhat.com/errata/RHSA-2023:1514
- URL-https://access.redhat.com/errata/RHSA-2023:1516

NEW
Explore Exposure Command
Confidently identify and prioritize exposures from endpoint to cloud with full attack surface visibility and threat-aware risk context.