Description
H2 1.4.197, as used in Datomic before 0.9.5697 and other products, allows remote code execution because CREATE ALIAS can execute arbitrary Java code. NOTE: the vendor's position is "h2 is not designed to be run outside of a secure environment."
Remediation
References
https://www.exploit-db.com/exploits/44422/
https://mthbernardes.github.io/rce/2018/03/14/abusing-h2-database-alias.html
https://forum.datomic.com/t/important-security-update-0-9-5697/379
http://blog.datomic.com/2018/03/important-security-update.html
https://lists.apache.org/thread.html/582d4165de6507b0be82d5a6f9a1ce392ec43a00c9fed32bacf7fe1e%40%3Cuser.ignite.apache.org%3E
https://lists.apache.org/thread.html/r8aaf4ee16bbaf6204731d4770d96ebb34b258cd79b491f9cdd7f2540%40%3Ccommits.nifi.apache.org%3E
https://github.com/h2database/h2database/issues/1225
https://github.com/h2database/h2database/issues/3099
https://github.com/h2database/h2database/issues/1808#issuecomment-599203115
https://security.netapp.com/advisory/ntap-20240719-0003/
Related Vulnerabilities
CVE-2021-21141 Vulnerability in maven package org.webjars.npm:electron
CVE-2021-21293 Vulnerability in maven package org.http4s:blaze-core_2.12
CVE-2022-0722 Vulnerability in maven package org.webjars.npm:parse-url
CVE-2019-10392 Vulnerability in maven package org.jenkins-ci.plugins:git-client
CVE-2020-2264 Vulnerability in maven package org.jenkins-ci.plugins:custom-job-icon