Cyber Posture

CVE-2022-31764

High

Published: 06 February 2025

Published
06 February 2025
Modified
16 July 2025
KEV Added
Patch
CVSS Score 8.5 CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:H
EPSS Score 0.0013 31.8th percentile
Risk Priority 17 60% EPSS · 20% KEV · 20% CVSS

Description

The Lite UI of Apache ShardingSphere ElasticJob-UI allows an attacker to perform RCE by constructing a special JDBC URL of H2 database. This issue affects Apache ShardingSphere ElasticJob-UI version 3.0.1 and prior versions. This vulnerability has been fixed in ElasticJob-UI 3.0.2. The premise of this attack is that the attacker has obtained the account and password. Otherwise, the attacker cannot perform this attack.

Security Summary

CVE-2022-31764 is a remote code execution (RCE) vulnerability in the Lite UI component of Apache ShardingSphere ElasticJob-UI. It allows an attacker to execute arbitrary code by crafting a malicious JDBC URL for the H2 database. The issue affects ElasticJob-UI version 3.0.1 and all prior versions, with a CVSS v3.1 base score of 8.5 (AV:N/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:H) and is associated with CWE-913 (Improper Control of Dynamically-Managed Code Resources).

An attacker with low-privileged (PR:L) access, such as valid account credentials to the Lite UI, can exploit this over the network (AV:N) despite high attack complexity (AC:H) and without user interaction (UI:N). Successful exploitation grants scope-changed (S:C) high-impact confidentiality, integrity, and availability (C:I:A:H), enabling full RCE on the server. The attack requires prior obtainment of account and password credentials.

Apache advisories confirm the vulnerability has been fixed in ElasticJob-UI version 3.0.2. Security practitioners should upgrade to this version for mitigation. Additional details are available in the official Apache mailing list announcement at https://lists.apache.org/thread/pg0k223m4hsnnzg4nh7lxvdxxgbkrlqb.

Details

CWE(s)
CWE-913

Affected Products

apache
shardingsphere elasticjob-ui
≤ 3.0.2

References