You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Path to vulnerable library: /2/repository/com/h2database/h2/1.4.197/h2-1.4.197.jar,/2/repository/com/h2database/h2/1.4.197/h2-1.4.197.jar,/home/wss-scanner/.m2/repository/com/h2database/h2/1.4.197/h2-1.4.197.jar,/home/wss-scanner/.m2/repository/com/h2database/h2/1.4.197/h2-1.4.197.jar,/home/wss-scanner/.m2/repository/com/h2database/h2/1.4.197/h2-1.4.197.jar,/2/repository/com/h2database/h2/1.4.197/h2-1.4.197.jar,/2/repository/com/h2database/h2/1.4.197/h2-1.4.197.jar,/home/wss-scanner/.m2/repository/com/h2database/h2/1.4.197/h2-1.4.197.jar,/2/repository/com/h2database/h2/1.4.197/h2-1.4.197.jar
The package com.h2database:h2 from 1.4.198 and before 2.0.202 are vulnerable to XML External Entity (XXE) Injection via the org.h2.jdbc.JdbcSQLXML class object, when it receives parsed string data from org.h2.jdbc.JdbcResultSet.getSQLXML() method. If it executes the getSource() method when the parameter is DOMSource.class it will trigger the vulnerability.
mend-for-github-combot
changed the title
CVE-2021-23463 (High) detected in h2-1.4.197.jar
CVE-2021-23463 (High) detected in h2-1.4.197.jar - autoclosed
May 10, 2022
✔️ This issue was automatically closed by WhiteSource because the vulnerable library in the specific branch(es) was either marked as ignored or it is no longer part of the WhiteSource inventory.
✔️ This issue was automatically closed by WhiteSource because the vulnerable library in the specific branch(es) was either marked as ignored or it is no longer part of the WhiteSource inventory.
CVE-2021-23463 - High Severity Vulnerability
H2 Database Engine
Library home page: http://www.h2database.com
Path to dependency file: /testsuite/model/pom.xml
Path to vulnerable library: /2/repository/com/h2database/h2/1.4.197/h2-1.4.197.jar,/2/repository/com/h2database/h2/1.4.197/h2-1.4.197.jar,/home/wss-scanner/.m2/repository/com/h2database/h2/1.4.197/h2-1.4.197.jar,/home/wss-scanner/.m2/repository/com/h2database/h2/1.4.197/h2-1.4.197.jar,/home/wss-scanner/.m2/repository/com/h2database/h2/1.4.197/h2-1.4.197.jar,/2/repository/com/h2database/h2/1.4.197/h2-1.4.197.jar,/2/repository/com/h2database/h2/1.4.197/h2-1.4.197.jar,/home/wss-scanner/.m2/repository/com/h2database/h2/1.4.197/h2-1.4.197.jar,/2/repository/com/h2database/h2/1.4.197/h2-1.4.197.jar
Dependency Hierarchy:
Found in HEAD commit: 9686933e579cc74ebc1592f893a47c601bcf4403
Found in base branch: master
The package com.h2database:h2 from 1.4.198 and before 2.0.202 are vulnerable to XML External Entity (XXE) Injection via the org.h2.jdbc.JdbcSQLXML class object, when it receives parsed string data from org.h2.jdbc.JdbcResultSet.getSQLXML() method. If it executes the getSource() method when the parameter is DOMSource.class it will trigger the vulnerability.
Publish Date: 2021-12-10
URL: CVE-2021-23463
Base Score Metrics:
Type: Upgrade version
Origin: https://nvd.nist.gov/vuln/detail/CVE-2021-23463
Release Date: 2021-12-10
Fix Resolution: 2.0.202
⛑️ Automatic Remediation is available for this issue
The text was updated successfully, but these errors were encountered: