Vulnerabilities

2 via 2 paths

Dependencies

137

Source

GitHub

Commit

373409e9

Find, fix and prevent vulnerabilities in your code.

Severity
  • 2
Status
  • 2
  • 0
  • 0

high severity

Remote Code Execution (RCE)

  • Vulnerable module: com.h2database:h2
  • Introduced through: org.flywaydb:flyway-commandline@10.11.1

Detailed paths

  • Introduced through: fecgov/openfec@fecgov/openfec#373409e949d936f470deaa7d24e179a21925f313 org.flywaydb:flyway-commandline@10.11.1 com.h2database:h2@2.2.220

Overview

com.h2database:h2 is a database engine

Affected versions of this package are vulnerable to Remote Code Execution (RCE). It provides a web console for managing the database, and by default it does not have a password set. The CREATE ALIAS function calls Java code, allowing an attacker to execute arbitrary Java code on projects running the h2 database.

NOTE: To be remotely exploitable, the affected application must be configured with the non-default setting webAllowOthers=true, either in a config file or as a parameter passed in when the servlet is invoked. The vulnerability can be avoided by setting a password on the database and/or restricting access to localhost using the above setting.

PoC

CREATE ALIAS REVERSE AS $$ String reverse(String s) { return new StringBuilder(s).reverse().toString(); } $$;
CALL REVERSE('Test');

Remediation

There is no fixed version for com.h2database:h2.

References

high severity

Allocation of Resources Without Limits or Throttling

  • Vulnerable module: com.nimbusds:nimbus-jose-jwt
  • Introduced through: org.flywaydb:flyway-commandline@10.11.1

Detailed paths

  • Introduced through: fecgov/openfec@fecgov/openfec#373409e949d936f470deaa7d24e179a21925f313 org.flywaydb:flyway-commandline@10.11.1 com.microsoft.azure:msal4j@1.13.8 com.nimbusds:oauth2-oidc-sdk@10.7.1 com.nimbusds:nimbus-jose-jwt@9.30.2

Overview

com.nimbusds:nimbus-jose-jwt is a library for JSON Web Tokens (JWT)

Affected versions of this package are vulnerable to Allocation of Resources Without Limits or Throttling due to a large JWE p2c header value (AKA iteration count) for the PasswordBasedDecrypter (PBKDF2) class. An attacker can cause resource consumption by specifying an excessively large iteration count.

Remediation

Upgrade com.nimbusds:nimbus-jose-jwt to version 9.37.2 or higher.

References