[Forgot Password]
Login  Register Subscribe

30479

 
 

423868

 
 

250770

 
 

909

 
 

196157

 
 

282

Paid content will be excluded from the download.


Download | Alert*
OVAL

DSA-5313-1 hsqldb -- hsqldb

ID: oval:org.secpod.oval:def:88452Date: (C)2023-03-28   (M)2023-06-16
Class: PATCHFamily: unix




It was found that those using java.sql.Statement or java.sql.PreparedStatement in hsqldb, a Java SQL database, to process untrusted input may be vulnerable to a remote code execution attack. By default it is allowed to call any static method of any Java class in the classpath resulting in code execution. The issue can be prevented by updating to 2.5.1-1+deb11u1 or by setting the system property "hsqldb.method_class_names" to classes which are allowed to be called. For example, System.setProperty or Java argument -Dhsqldb.method_class_names="abc" can be used. From version 2.5.1-1+deb11u1 all classes by default are not accessible except those in java.lang.Math and need to be manually enabled.

Platform:
Linux Mint 5
Product:
hsqldb-utils
libhsqldb-java
Reference:
DSA-5313-1
CVE-2022-41853
CVE    1
CVE-2022-41853
CPE    1
cpe:/o:linux_mint:linux_mint:5

© SecPod Technologies