Cybersecurity specialists report the detection of a new critical vulnerability that resides in the JNDI of the H2 database console, exploitable in an attack similar to Log4Shell. Although a level of exploitation similar to that of the Log4j flaws is not foreseen, the cybersecurity community is already analyzing the potential risks derived from this flaw, which will be tracked as CVE-2021-42392.

JFrog researchers mention that JNDI is an API that provides directory functionalities and names for Java applications, while H2 is an open-source Java SQL database widely used, primarily by Internet of Things (IoT) device manufacturers.

According to the report, this flaw was also detected in early December, discovering URLs controlled by threat actors to facilitate remote execution of unauthenticated code, allowing threat actors to take control over affected deployments.

Experts consider this to be the first critical flaw found since the finding of Log4Shell exploiting the same attack root but not being part of Log4j: “There are likely to be more packets affected by the same root cause as Log4Shell, accepting arbitrary JNDI search URLs. We have adjusted our automated vulnerability detection framework to account for the javax.naming.Context.lookup function as a dangerous function and released the framework in the Maven repository to find issues similar to Log4Shell2,” the researchers report.

The H2 database package was one of the first to be validated and reported to its developers, who immediately released a new version, available on GitHub. Experts add that several code paths in the H2 database framework pass unfiltered in attacker-controlled URLs to the javax.naming.Context.lookup function, which would allow remote loading of the code base.

In the report, H2 database users are asked to upgrade their deployments to the latest version available: “If you are running an H2 console that is exposed to your LAN, this issue is extremely critical and you should upgrade your H2 database to version 2.0.206 immediately,” JFrog adds.

To learn more about information security risks, malware variants, vulnerabilities and information technologies, feel free to access the International Institute of Cyber Security (IICS) websites.

The post New critical vulnerability similar to log4j discovered in Java applications with H2 databases appeared first on Information Security Newspaper | Hacking News.

source

You May Also Like

Zero-click remote code execution exploit for fully patched iOS 15 running on iPhone 13 demonstrated by experts

During the latest version of the Tianfu Cup event for ethical hackers,…

Microsoft discloses NETGEAR firmware vulnerabilities

Cybersecurity researchers have disclosed critical security vulnerabilities that affect NETGEAR DGN2200v1 series…

2 critical vulnerabilities in Fortinet’s FortiWeb web application firewall can give cyber criminals access to your applications

Cybersecurity experts report the discovery of a critical vulnerability in FortiWeb, the…

Critical remote code execution vulnerability in Android 12 affects millions of smartphones

The latest Android operating system update includes a patch for a critical…