CVE-2022-46337

Severity CVSS v4.0:
Pending analysis
Type:
CWE-74 Injection
Publication date:
20/11/2023
Last modified:
10/06/2025

Description

A cleverly devised username might bypass LDAP authentication checks. In <br /> LDAP-authenticated Derby installations, this could let an attacker fill <br /> up the disk by creating junk Derby databases. In LDAP-authenticated <br /> Derby installations, this could also allow the attacker to execute <br /> malware which was visible to and executable by the account which booted <br /> the Derby server. In LDAP-protected databases which weren&amp;#39;t also <br /> protected by SQL GRANT/REVOKE authorization, this vulnerability could <br /> also let an attacker view and corrupt sensitive data and run sensitive <br /> database functions and procedures.<br /> <br /> Mitigation:<br /> <br /> Users should upgrade to Java 21 and Derby 10.17.1.0.<br /> <br /> Alternatively, users who wish to remain on older Java versions should <br /> build their own Derby distribution from one of the release families to <br /> which the fix was backported: 10.16, 10.15, and 10.14. Those are the <br /> releases which correspond, respectively, with Java LTS versions 17, 11, <br /> and 8.<br /> <br />

Vulnerable products and versions

CPE From Up to
cpe:2.3:a:apache:derby:*:*:*:*:*:*:*:* 10.1.1.0 (including) 10.14.3.0 (excluding)
cpe:2.3:a:apache:derby:*:*:*:*:*:*:*:* 10.15.1.3 (including) 10.15.2.1 (excluding)
cpe:2.3:a:apache:derby:10.16.1.1:*:*:*:*:*:*:*