{"dataType":"CVE_RECORD","dataVersion":"5.1","cveMetadata":{"cveId":"CVE-2022-31764","assignerOrgId":"f0158376-9dc2-43b6-827c-5f631a4d8d09","state":"PUBLISHED","assignerShortName":"apache","dateReserved":"2022-05-27T08:27:18.571Z","datePublished":"2025-02-06T14:23:03.166Z","dateUpdated":"2025-02-06T16:25:45.921Z"},"containers":{"cna":{"affected":[{"product":"Apache ShardingSphere ElasticJob-UI","vendor":"Apache Software Foundation","versions":[{"lessThanOrEqual":"3.0.1","status":"affected","version":"3.0.0","versionType":"custom"}]}],"descriptions":[{"lang":"en","value":"The Lite UI of Apache ShardingSphere ElasticJob-UI allows an attacker to perform RCE by constructing a special JDBC URL of H2 database. This issue affects Apache ShardingSphere ElasticJob-UI version 3.0.1 and prior versions. This vulnerability has been fixed in ElasticJob-UI 3.0.2.\nThe premise of this attack is that the attacker has obtained the account and password. Otherwise, the attacker cannot perform this attack."}],"problemTypes":[{"descriptions":[{"cweId":"CWE-913","description":"CWE-913 Improper Control of Dynamically-Managed Code Resources","lang":"en","type":"CWE"}]}],"providerMetadata":{"orgId":"f0158376-9dc2-43b6-827c-5f631a4d8d09","shortName":"apache","dateUpdated":"2025-02-06T14:23:03.166Z"},"source":{"discovery":"UNKNOWN"},"title":"Apache ShardingSphere ElasticJob-UI allows RCE via event trace data source JDBC","x_generator":{"engine":"vulnogram 0.2.0"},"x_legacyV4Record":{"CVE_data_meta":{"ASSIGNER":"security@apache.org","ID":"CVE-2022-31764","STATE":"PUBLIC","TITLE":"Apache ShardingSphere ElasticJob-UI allows RCE via event trace data source JDBC"},"affects":{"vendor":{"vendor_data":[{"product":{"product_data":[{"product_name":"Apache ShardingSphere ElasticJob-UI","version":{"version_data":[{"version_affected":"<=","version_name":"Apache ShardingSphere ElasticJob-UI 3.x","version_value":"3.0.1"}]}}]},"vendor_name":"Apache Software Foundation"}]}},"data_format":"MITRE","data_type":"CVE","data_version":"4.0","description":{"description_data":[{"lang":"eng","value":"The Lite UI of Apache ShardingSphere ElasticJob-UI allows an attacker to perform RCE by constructing a special JDBC URL of H2 database. This issue affects Apache ShardingSphere ElasticJob-UI version 3.0.1 and prior versions. This vulnerability has been fixed in ElasticJob-UI 3.0.2.\nThe premise of this attack is that the attacker has obtained the account and password. Otherwise, the attacker cannot perform this attack."}]},"generator":{"engine":"vulnogram 0.2.0"},"impact":[{}],"problemtype":{"problemtype_data":[{"description":[{"lang":"eng","value":"CWE-913 Improper Control of Dynamically-Managed Code Resources"}]}]},"references":{"reference_data":[]},"source":{"discovery":"UNKNOWN"}},"references":[{"url":"https://lists.apache.org/thread/pg0k223m4hsnnzg4nh7lxvdxxgbkrlqb","tags":["vendor-advisory"]}]},"adp":[{"metrics":[{"cvssV3_1":{"scope":"CHANGED","version":"3.1","baseScore":8.5,"attackVector":"NETWORK","baseSeverity":"HIGH","vectorString":"CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:H","integrityImpact":"HIGH","userInteraction":"NONE","attackComplexity":"HIGH","availabilityImpact":"HIGH","privilegesRequired":"LOW","confidentialityImpact":"HIGH"}},{"other":{"type":"ssvc","content":{"timestamp":"2025-02-06T16:25:39.373808Z","id":"CVE-2022-31764","options":[{"Exploitation":"none"},{"Automatable":"no"},{"Technical Impact":"total"}],"role":"CISA Coordinator","version":"2.0.3"}}}],"title":"CISA ADP Vulnrichment","providerMetadata":{"orgId":"134c704f-9b21-4f2e-91b3-4a467353bcc0","shortName":"CISA-ADP","dateUpdated":"2025-02-06T16:25:45.921Z"}}]}}