CVE-2024-55551

high

Description

An issue was discovered in Exasol JDBC driver before 24.2.1 (2024-12-10). Attackers can inject malicious parameters into the JDBC URL, triggering JNDI injection during the process when the JDBC Driver uses this URL to connect to the database. This can further lead to remote code execution.

References

https://www.blackhat.com/eu-24/briefings/schedule/index.html#a-novel-attack-surface-java-authentication-and-authorization-service-jaas-42179

https://gist.github.com/azraelxuemo/9565ec9219e0c3e9afd5474904c39d0f

https://docs.exasol.com/db/latest/connect_exasol/drivers/jdbc.htm

https://docs.exasol.com/db/7.1/release_notes_drivers_jdbc/24.2.1.htm

Details

Source: Mitre, NVD

Published: 2025-03-19

Updated: 2025-04-02

Risk Information

CVSS v2

Base Score: 7.6

Vector: CVSS2#AV:N/AC:H/Au:N/C:C/I:C/A:C

Severity: High

CVSS v3

Base Score: 7.5

Vector: CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H

Severity: High

EPSS

EPSS: 0.00155