Bug 2209579 (CVE-2023-32697)

Summary: CVE-2023-32697 sqlite-jdbc: Remote code execution when JDBC url is attacker controlled
Product: [Other] Security Response Reporter: Avinash Hanwate <ahanwate>
Component: vulnerabilityAssignee: Red Hat Product Security <security-response-team>
Status: CLOSED WONTFIX QA Contact:
Severity: high Docs Contact:
Priority: high    
Version: unspecifiedCC: aileenc, boliveir, chazlett, drichtar, eglynn, gmalinko, janstey, jjoyce, jpavlik, lhh, lpeer, mburns, mgarciac, mkolesni, pdelbell, pdrozd, pjindal, pskopek, rowaters, scohen, spower, sthorger
Target Milestone: ---Keywords: Security
Target Release: ---   
Hardware: All   
OS: Linux   
Whiteboard:
Fixed In Version: sqlite-jdbc 3.41.2.2 Doc Type: If docs needed, set a value
Doc Text:
A flaw was found in SQLite-JDBC. A vulnerability found JDBC URL allowed a malicious user to cause Remote Code Execution (RCE).
Story Points: ---
Clone Of: Environment:
Last Closed: 2023-05-24 19:42:01 UTC Type: ---
Regression: --- Mount Type: ---
Documentation: --- CRM:
Verified Versions: Category: ---
oVirt Team: --- RHEL 7.3 requirements from Atomic Host:
Cloudforms Team: --- Target Upstream Version:
Embargoed:
Bug Depends On:    
Bug Blocks: 2209581    

Description Avinash Hanwate 2023-05-24 06:01:36 UTC
SQLite JDBC is a library for accessing and creating SQLite database files in Java. Sqlite-jdbc addresses a remote code execution vulnerability via JDBC URL. This issue impacting versions 3.6.14.1 through 3.41.2.1 and has been fixed in version 3.41.2.2.


https://github.com/xerial/sqlite-jdbc/releases/tag/3.41.2.2
https://github.com/xerial/sqlite-jdbc/security/advisories/GHSA-6phf-6h5g-97j2

Comment 1 Product Security DevOps Team 2023-05-24 19:41:58 UTC
This bug is now closed. Further updates for individual products will be reflected on the CVE page(s):

https://access.redhat.com/security/cve/cve-2023-32697