CVE-2022-31764
Published: 06 February 2025
Description
The Lite UI of Apache ShardingSphere ElasticJob-UI allows an attacker to perform RCE by constructing a special JDBC URL of H2 database. This issue affects Apache ShardingSphere ElasticJob-UI version 3.0.1 and prior versions. This vulnerability has been fixed in ElasticJob-UI 3.0.2. The premise of this attack is that the attacker has obtained the account and password. Otherwise, the attacker cannot perform this attack.
Security Summary
CVE-2022-31764 is a remote code execution (RCE) vulnerability in the Lite UI component of Apache ShardingSphere ElasticJob-UI. It allows an attacker to execute arbitrary code by crafting a malicious JDBC URL for the H2 database. The issue affects ElasticJob-UI version 3.0.1 and all prior versions, with a CVSS v3.1 base score of 8.5 (AV:N/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:H) and is associated with CWE-913 (Improper Control of Dynamically-Managed Code Resources).
An attacker with low-privileged (PR:L) access, such as valid account credentials to the Lite UI, can exploit this over the network (AV:N) despite high attack complexity (AC:H) and without user interaction (UI:N). Successful exploitation grants scope-changed (S:C) high-impact confidentiality, integrity, and availability (C:I:A:H), enabling full RCE on the server. The attack requires prior obtainment of account and password credentials.
Apache advisories confirm the vulnerability has been fixed in ElasticJob-UI version 3.0.2. Security practitioners should upgrade to this version for mitigation. Additional details are available in the official Apache mailing list announcement at https://lists.apache.org/thread/pg0k223m4hsnnzg4nh7lxvdxxgbkrlqb.
Details
- CWE(s)