Description
H2 1.4.197, as used in Datomic before 0.9.5697 and other products, allows remote code execution because CREATE ALIAS can execute arbitrary Java code. NOTE: the vendor's position is "h2 is not designed to be run outside of a secure environment."
Remediation
References
https://www.exploit-db.com/exploits/44422/
https://mthbernardes.github.io/rce/2018/03/14/abusing-h2-database-alias.html
https://forum.datomic.com/t/important-security-update-0-9-5697/379
http://blog.datomic.com/2018/03/important-security-update.html
https://lists.apache.org/thread.html/582d4165de6507b0be82d5a6f9a1ce392ec43a00c9fed32bacf7fe1e%40%3Cuser.ignite.apache.org%3E
https://lists.apache.org/thread.html/r8aaf4ee16bbaf6204731d4770d96ebb34b258cd79b491f9cdd7f2540%40%3Ccommits.nifi.apache.org%3E
https://github.com/h2database/h2database/issues/1225
https://github.com/h2database/h2database/issues/3099
https://github.com/h2database/h2database/issues/1808#issuecomment-599203115
https://security.netapp.com/advisory/ntap-20240719-0003/
Related Vulnerabilities
CVE-2018-5673 Vulnerability in maven package org.dojotoolkit:dojo
CVE-2020-7706 Vulnerability in npm package connie-lang
CVE-2016-10607 Vulnerability in npm package openframe-glslviewer
CVE-2019-14517 Vulnerability in maven package org.webjars.npm:editor.md
CVE-2021-25864 Vulnerability in npm package node-red-contrib-huemagic