Skip to main content

CVE-2022-23221: n/a in n/a

Critical
VulnerabilityCVE-2022-23221cvecve-2022-23221
Published: Wed Jan 19 2022 (01/19/2022, 00:00:00 UTC)
Source: CVE
Vendor/Project: n/a
Product: n/a

Description

H2 Console before 2.1.210 allows remote attackers to execute arbitrary code via a jdbc:h2:mem JDBC URL containing the IGNORE_UNKNOWN_SETTINGS=TRUE;FORBID_CREATION=FALSE;INIT=RUNSCRIPT substring, a different vulnerability than CVE-2021-42392.

AI-Powered Analysis

AILast updated: 07/03/2025, 11:25:00 UTC

Technical Analysis

CVE-2022-23221 is a critical remote code execution vulnerability affecting the H2 Console component of the H2 database prior to version 2.1.210. The vulnerability arises from improper handling of JDBC URLs that include the parameters IGNORE_UNKNOWN_SETTINGS=TRUE;FORBID_CREATION=FALSE;INIT=RUNSCRIPT. An attacker can craft a malicious jdbc:h2:mem URL containing these substrings to execute arbitrary code remotely without requiring authentication or user interaction. This vulnerability is distinct from the previously known CVE-2021-42392. The root cause is related to CWE-88 (Argument Injection or Modification), where unsanitized input parameters allow injection of commands that the system executes. The CVSS v3.1 score is 9.8 (critical), reflecting the high impact on confidentiality, integrity, and availability, with an attack vector over the network, no privileges required, and no user interaction needed. Exploitation could lead to full system compromise, data theft, or service disruption. No official patch links are provided in the data, but upgrading to H2 version 2.1.210 or later is implied to remediate the issue. No known exploits in the wild have been reported as of the publication date (January 2022).

Potential Impact

For European organizations, this vulnerability poses a significant risk, especially for those using the H2 database in development, testing, or production environments where the H2 Console is exposed to untrusted networks. Successful exploitation could lead to unauthorized remote code execution, enabling attackers to compromise sensitive data, disrupt services, or pivot to other internal systems. Given the critical severity and ease of exploitation (no authentication or user interaction required), organizations face potential data breaches, operational downtime, and reputational damage. Industries with strict data protection regulations such as finance, healthcare, and government sectors in Europe are particularly vulnerable. The vulnerability could also be leveraged in supply chain attacks if H2 is embedded in third-party applications used by European enterprises.

Mitigation Recommendations

European organizations should immediately verify if they use H2 database versions prior to 2.1.210, especially with the H2 Console accessible remotely. Specific mitigation steps include: 1) Upgrade to H2 version 2.1.210 or later where the vulnerability is patched. 2) Restrict network access to the H2 Console interface, ensuring it is not exposed to the internet or untrusted networks. 3) Implement network-level controls such as firewalls or VPNs to limit access to trusted administrators only. 4) Disable or remove the H2 Console in production environments if not strictly necessary. 5) Monitor logs for suspicious JDBC URL patterns containing IGNORE_UNKNOWN_SETTINGS, FORBID_CREATION, or INIT parameters that could indicate exploitation attempts. 6) Conduct code reviews and dependency audits to identify embedded H2 database usage in internal or third-party applications. 7) Employ application-layer security controls to sanitize and validate input parameters related to database connections. These targeted measures go beyond generic patching advice and focus on reducing attack surface and early detection.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
mitre
Date Reserved
2022-01-14T00:00:00.000Z
Cisa Enriched
true
Cvss Version
3.1
State
PUBLISHED

Threat ID: 682d981ec4522896dcbdbff7

Added to database: 5/21/2025, 9:08:46 AM

Last enriched: 7/3/2025, 11:25:00 AM

Last updated: 8/1/2025, 9:02:59 AM

Views: 13

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats