Description
H2 1.4.197, as used in Datomic before 0.9.5697 and other products, allows remote code execution because CREATE ALIAS can execute arbitrary Java code. NOTE: the vendor's position is "h2 is not designed to be run outside of a secure environment."
Remediation
References
https://www.exploit-db.com/exploits/44422/
https://mthbernardes.github.io/rce/2018/03/14/abusing-h2-database-alias.html
https://forum.datomic.com/t/important-security-update-0-9-5697/379
http://blog.datomic.com/2018/03/important-security-update.html
https://lists.apache.org/thread.html/582d4165de6507b0be82d5a6f9a1ce392ec43a00c9fed32bacf7fe1e%40%3Cuser.ignite.apache.org%3E
https://lists.apache.org/thread.html/r8aaf4ee16bbaf6204731d4770d96ebb34b258cd79b491f9cdd7f2540%40%3Ccommits.nifi.apache.org%3E
https://github.com/h2database/h2database/issues/1225
https://github.com/h2database/h2database/issues/3099
https://github.com/h2database/h2database/issues/1808#issuecomment-599203115
https://security.netapp.com/advisory/ntap-20240719-0003/
Related Vulnerabilities
CVE-2022-27260 Vulnerability in npm package buttercms
CVE-2019-10414 Vulnerability in maven package de.wellnerbou.jenkins:git-changelog
CVE-2022-21213 Vulnerability in maven package org.webjars:mout
CVE-2016-3088 Vulnerability in maven package org.apache.activemq:activemq-fileserver
CVE-2023-40350 Vulnerability in maven package org.jenkins-ci.plugins:docker-swarm