{"api_version":"1","generated_at":"2026-04-30T09:14:55+00:00","cve":"CVE-2022-41853","urls":{"html":"https://cve.report/CVE-2022-41853","api":"https://cve.report/api/cve/CVE-2022-41853.json","docs":"https://cve.report/api","cve_org":"https://www.cve.org/CVERecord?id=CVE-2022-41853","nvd":"https://nvd.nist.gov/vuln/detail/CVE-2022-41853"},"summary":{"title":"CVE-2022-41853","description":"Those using java.sql.Statement or java.sql.PreparedStatement in hsqldb (HyperSQL DataBase) to process untrusted input may be vulnerable to a remote code execution attack. By default it is allowed to call any static method of any Java class in the classpath resulting in code execution. The issue can be prevented by updating to 2.7.1 or by setting the system property \"hsqldb.method_class_names\" to classes which are allowed to be called. For example, System.setProperty(\"hsqldb.method_class_names\", \"abc\") or Java argument -Dhsqldb.method_class_names=\"abc\" can be used. From version 2.7.1 all classes by default are not accessible except those in java.lang.Math and need to be manually enabled.","state":"PUBLIC","assigner":"security@google.com","published_at":"2022-10-06 18:17:00","updated_at":"2023-02-03 23:43:00"},"problem_types":["NVD-CWE-noinfo"],"metrics":[],"references":[{"url":"http://hsqldb.org/doc/2.0/guide/sqlroutines-chapt.html#src_jrt_access_control","name":"http://hsqldb.org/doc/2.0/guide/sqlroutines-chapt.html#src_jrt_access_control","refsource":"MISC","tags":[],"title":"Chapter 9. SQL-Invoked Routines","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"https://lists.debian.org/debian-lts-announce/2022/12/msg00020.html","name":"[debian-lts-announce] 20221210 [SECURITY] [DLA 3234-1] hsqldb security update","refsource":"MLIST","tags":[],"title":"[SECURITY] [DLA 3234-1] hsqldb security update","mime":"text/html","httpstatus":"200","archivestatus":"404"},{"url":"https://www.debian.org/security/2023/dsa-5313","name":"DSA-5313","refsource":"DEBIAN","tags":[],"title":"Debian -- Security Information -- DSA-5313-1 hsqldb","mime":"text/html","httpstatus":"200","archivestatus":"404"},{"url":"https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=50212#c7","name":"https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=50212#c7","refsource":"MISC","tags":[],"title":"50212 - \n \n \n oss-fuzz -\n \n \n OSS-Fuzz: Fuzzing the planet - \n \n Monorail","mime":"text/html","httpstatus":"200","archivestatus":"404"},{"url":"https://www.cve.org/CVERecord?id=CVE-2022-41853","name":"CVE Program record","refsource":"CVE.ORG","tags":["canonical"]},{"url":"https://nvd.nist.gov/vuln/detail/CVE-2022-41853","name":"NVD vulnerability detail","refsource":"NVD","tags":["canonical","analysis"]}],"affected":[],"timeline":[],"solutions":[],"workarounds":[],"exploits":[],"credits":[],"nvd_cpes":[{"cve_year":"2022","cve_id":"41853","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"o","cpe4":"debian","cpe5":"debian_linux","cpe6":"10.0","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2022","cve_id":"41853","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"o","cpe4":"debian","cpe5":"debian_linux","cpe6":"11.0","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2022","cve_id":"41853","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"hsqldb","cpe5":"hypersql_database","cpe6":"*","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"}],"vendor_comments":[],"enrichments":{"kev":null,"epss":null,"legacy_qids":[{"cve":"CVE-2022-41853","qid":"160259","title":"Oracle Enterprise Linux Security Update for hsqldb (ELSA-2022-8560)"},{"cve":"CVE-2022-41853","qid":"160456","title":"Oracle Enterprise Linux Security Update for hsqldb (ELSA-2023-12103)"},{"cve":"CVE-2022-41853","qid":"181313","title":"Debian Security Update for hsqldb (DLA 3234-1)"},{"cve":"CVE-2022-41853","qid":"181466","title":"Debian Security Update for hsqldb (DSA 5313-1)"},{"cve":"CVE-2022-41853","qid":"184563","title":"Debian Security Update for hsqldb (CVE-2022-41853)"},{"cve":"CVE-2022-41853","qid":"240937","title":"Red Hat Update for hsqldb (RHSA-2022:8560)"},{"cve":"CVE-2022-41853","qid":"241301","title":"Red Hat Update for JBoss Enterprise Application Platform 7.4.1 on RHEL 7 (RHSA-2023:1512)"},{"cve":"CVE-2022-41853","qid":"241302","title":"Red Hat Update for JBoss Enterprise Application Platform 7.4.1 on RHEL 8 (RHSA-2023:1513)"},{"cve":"CVE-2022-41853","qid":"241303","title":"Red Hat Update for JBoss Enterprise Application Platform 7.4.1 on RHEL 9 (RHSA-2023:1514)"},{"cve":"CVE-2022-41853","qid":"257204","title":"CentOS Security Update for hsqldb (CESA-2022:8560)"},{"cve":"CVE-2022-41853","qid":"354645","title":"Amazon Linux Security Advisory for hsqldb : ALAS2-2023-1914"},{"cve":"CVE-2022-41853","qid":"354681","title":"Amazon Linux Security Advisory for hsqldb : ALAS-2023-1666"},{"cve":"CVE-2022-41853","qid":"377795","title":"Alibaba Cloud Linux Security Update for hsqldb (ALINUX2-SA-2022:0054)"},{"cve":"CVE-2022-41853","qid":"673110","title":"EulerOS Security Update for hsqldb (EulerOS-SA-2023-2147)"},{"cve":"CVE-2022-41853","qid":"752758","title":"SUSE Enterprise Linux Security Update for hsqldb (SUSE-SU-2022:3864-1)"}]},"source_records":{"cve_program":{"CVE_data_meta":{"ASSIGNER":"security@google.com","DATE_PUBLIC":"2021-07-26T22:00:00.000Z","ID":"CVE-2022-41853","STATE":"PUBLIC","TITLE":"Remote code execution in HyperSQL DataBase"},"affects":{"vendor":{"vendor_data":[{"product":{"product_data":[{"product_name":"hsqldb","version":{"version_data":[{"version_affected":"<","version_value":"2.7.1"}]}}]},"vendor_name":"HyperSQL DataBase"}]}},"data_format":"MITRE","data_type":"CVE","data_version":"4.0","description":{"description_data":[{"lang":"eng","value":"Those using java.sql.Statement or java.sql.PreparedStatement in hsqldb (HyperSQL DataBase) to process untrusted input may be vulnerable to a remote code execution attack. By default it is allowed to call any static method of any Java class in the classpath resulting in code execution. The issue can be prevented by updating to 2.7.1 or by setting the system property \"hsqldb.method_class_names\" to classes which are allowed to be called. For example, System.setProperty(\"hsqldb.method_class_names\", \"abc\") or Java argument -Dhsqldb.method_class_names=\"abc\" can be used. From version 2.7.1 all classes by default are not accessible except those in java.lang.Math and need to be manually enabled."}]},"generator":{"engine":"Vulnogram 0.0.9"},"impact":{"cvss":{"attackComplexity":"HIGH","attackVector":"NETWORK","availabilityImpact":"HIGH","baseScore":8,"baseSeverity":"HIGH","confidentialityImpact":"HIGH","integrityImpact":"HIGH","privilegesRequired":"LOW","scope":"CHANGED","userInteraction":"REQUIRED","vectorString":"CVSS:3.1/AV:N/AC:H/PR:L/UI:R/S:C/C:H/I:H/A:H","version":"3.1"}},"problemtype":{"problemtype_data":[{"description":[{"lang":"eng","value":"CWE-470 Use of Externally-Controlled Input to Select Classes or Code ('Unsafe Reflection')"}]}]},"references":{"reference_data":[{"refsource":"MISC","url":"https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=50212#c7","name":"https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=50212#c7"},{"refsource":"MISC","url":"http://hsqldb.org/doc/2.0/guide/sqlroutines-chapt.html#src_jrt_access_control","name":"http://hsqldb.org/doc/2.0/guide/sqlroutines-chapt.html#src_jrt_access_control"},{"refsource":"MLIST","name":"[debian-lts-announce] 20221210 [SECURITY] [DLA 3234-1] hsqldb security update","url":"https://lists.debian.org/debian-lts-announce/2022/12/msg00020.html"},{"refsource":"DEBIAN","name":"DSA-5313","url":"https://www.debian.org/security/2023/dsa-5313"}]},"source":{"discovery":"INTERNAL"}},"nvd":{"publishedDate":"2022-10-06 18:17:00","lastModifiedDate":"2023-02-03 23:43:00","problem_types":["NVD-CWE-noinfo"],"metrics":{"baseMetricV3":{"cvssV3":{"version":"3.1","vectorString":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H","attackVector":"NETWORK","attackComplexity":"LOW","privilegesRequired":"NONE","userInteraction":"NONE","scope":"UNCHANGED","confidentialityImpact":"HIGH","integrityImpact":"HIGH","availabilityImpact":"HIGH","baseScore":9.8,"baseSeverity":"CRITICAL"},"exploitabilityScore":3.9,"impactScore":5.9}},"configurations":{"CVE_data_version":"4.0","nodes":[{"operator":"OR","children":[],"cpe_match":[{"vulnerable":true,"cpe23Uri":"cpe:2.3:a:hsqldb:hypersql_database:*:*:*:*:*:*:*:*","versionEndExcluding":"2.7.1","cpe_name":[]}]},{"operator":"OR","children":[],"cpe_match":[{"vulnerable":true,"cpe23Uri":"cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*","cpe_name":[]},{"vulnerable":true,"cpe23Uri":"cpe:2.3:o:debian:debian_linux:11.0:*:*:*:*:*:*:*","cpe_name":[]}]}]}},"legacy_mitre":{"record":null,"notes":[]}}}