Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

com.h2database:h2 XML External Entity (XXE) Injection #157

Open
chickenPopcorn opened this issue Nov 24, 2021 · 1 comment
Open

com.h2database:h2 XML External Entity (XXE) Injection #157

chickenPopcorn opened this issue Nov 24, 2021 · 1 comment

Comments

@chickenPopcorn
Copy link

We put the project through Snyk, and it reported a vulnerability. Can we take a look at it?

Introduced through
com.h2database:[email protected] and org.javalite:[email protected]
Exploit maturity: PROOF OF CONCEPT

Detailed paths
Introduced through: com.lyft.data:[email protected] › com.h2database:[email protected]
Fix: No remediation path available.
Introduced through: com.lyft.data:[email protected] › org.javalite:[email protected] › com.h2database:[email protected]
Fix: No remediation path available.
Overview
com.h2database:h2 is a database engine

Affected versions of this package are vulnerable to XML External Entity (XXE) Injection via the org.h2.jdbc.JdbcSQLXML class object, when it receives parsed string data from org.h2.jdbc.JdbcResultSet.getSQLXML() method. If it executes the getSource() method when the parameter is DOMSource.class it will trigger the vulnerability.
@endoplasmicR
Copy link
Contributor

It seems suggesting a SQL injection vulnerability, but the message is not very clear. it would be useful to elaborate more on the location of the getSQLXML() call

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
None yet
Projects
None yet
Development

No branches or pull requests

2 participants