| Vulnerability Name: | CVE-2018-14335 (CCN-147331) | ||||||||||||||||||||||||||||||||
| Assigned: | 2018-07-16 | ||||||||||||||||||||||||||||||||
| Published: | 2018-07-16 | ||||||||||||||||||||||||||||||||
| Updated: | 2020-08-24 | ||||||||||||||||||||||||||||||||
| Summary: | An issue was discovered in H2 1.4.197. Insecure handling of permissions in the backup function allows attackers to read sensitive files (outside of their permissions) via a symlink to a fake database file. | ||||||||||||||||||||||||||||||||
| CVSS v3 Severity: | 6.5 Medium (CVSS v3.1 Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N) 5.9 Medium (Temporal CVSS v3.1 Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:P/RL:U/RC:R)
6.8 Medium (CCN Temporal CVSS v3.1 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N/E:P/RL:U/RC:R)
| ||||||||||||||||||||||||||||||||
| CVSS v2 Severity: | 4.0 Medium (CVSS v2 Vector: AV:N/AC:L/Au:S/C:P/I:N/A:N)
| ||||||||||||||||||||||||||||||||
| Vulnerability Type: | CWE-59 | ||||||||||||||||||||||||||||||||
| Vulnerability Consequences: | Obtain Information | ||||||||||||||||||||||||||||||||
| References: | Source: MITRE Type: CNA CVE-2018-14335 Source: CCN Type: H2 Web site H2 Database Source: REDHAT Type: UNKNOWN RHSA-2020:0727 Source: XF Type: UNKNOWN h2database-cve201814335-info-disc(147331) Source: CCN Type: GitHub Web site H2 Database - Insecure File Permissions Source: MISC Type: Exploit, Third Party Advisory https://gist.github.com/owodelta/9714faf9a86435cef5a99d4930eaee20 Source: MLIST Type: UNKNOWN [ignite-user] 20191213 Re: H2 version security concern Source: CCN Type: Packet Storm Security [07-30-2018] H2 Database 1.4.197 Information Disclosure Source: EXPLOIT-DB Type: EXPLOIT Offensive Security Exploit Database [07-30-2018] Source: EXPLOIT-DB Type: Exploit, Third Party Advisory, VDB Entry 45105 Source: CCN Type: IBM Security Bulletin 6453461 (Control Center) H2 Database Vulnerabilities Affect IBM Control Center (CVE-2018-10054, CVE-2018-14335) | ||||||||||||||||||||||||||||||||
| Vulnerable Configuration: | Configuration 1: Denotes that component is vulnerable | ||||||||||||||||||||||||||||||||
| Oval Definitions | |||||||||||||||||||||||||||||||||
| |||||||||||||||||||||||||||||||||
| BACK | |||||||||||||||||||||||||||||||||