This is a summary of the AI-generated 10-question deep analysis. The full version (longer answers, follow-up Q&A, related CVEs) requires login. Read the full analysis β
Q1What is this vulnerability? (Essence + Consequences)
π¨ **Essence**: H2 Database allows attackers to inject malicious JNDI references via the `getConnection` method. π₯ **Consequences**: This leads to **Remote Code Execution (RCE)**.β¦
π‘οΈ **Root Cause**: **CWE-502** (Deserialization of Untrusted Data / JNDI Injection). The flaw lies in how H2 handles driver class names and URLs.β¦
π¦ **Affected**: **H2 Database** versions prior to **2.0.206**. It is a Java-based embedded RDBMS. Any system using this version range is at risk.
Q4What can hackers do? (Privileges/Data)
π **Attacker Capabilities**: Full **Remote Code Execution**. Hackers gain the same privileges as the H2 process. They can read, modify, or delete sensitive data, and pivot to other internal systems.
Q5Is exploitation threshold high? (Auth/Config)
β οΈ **Threshold**: **Low**. Exploitation requires access to the H2 Console or TCP service. No authentication is needed if the console is exposed or TCP port (9092) is open. Config is often default.
Q6Is there a public Exp? (PoC/Wild Exploitation)
π₯ **Public Exploits**: **Yes**. Multiple PoCs are available on GitHub (e.g., `CVE-2021-42392-Detect`, `vulhub`). Wild exploitation is possible via the Web Console or direct TCP connection.
Q7How to self-check? (Features/Scanning)
π **Self-Check**: Scan for H2 Console pages. Use scripts like `h2-detect.py` to identify vulnerable IPs. Check if the H2 TCP port (9092) is accessible and unauthenticated.
Q8Is it fixed officially? (Patch/Mitigation)
β **Official Fix**: **Yes**. Upgrade H2 Database to version **2.0.206** or later. This patch resolves the JNDI injection vulnerability in the connection handling logic.
Q9What if no patch? (Workaround)
π§ **No Patch?**: **Mitigation**: Disable the H2 Web Console if not needed. Restrict access to the H2 TCP port (9092) via firewalls. Do not expose the console to the internet.
Q10Is it urgent? (Priority Suggestion)
π΄ **Urgency**: **CRITICAL**. This is a high-severity RCE vulnerability with easy exploitation. Patch immediately or apply strict network restrictions to prevent compromise.