Logo
-

Byte Open Security

(ByteOS Network)

Log In

Sign Up

ByteOS

Security
Vulnerability Details
Registries
Custom Views
Weaknesses
Attack Patterns
Filters & Tools
Vulnerability Details :

CVE-2022-42467

Summary
Assigner-apache
Assigner Org ID-f0158376-9dc2-43b6-827c-5f631a4d8d09
Published At-19 Oct, 2022 | 00:00
Updated At-03 Aug, 2024 | 13:10
Rejected At-
Credits

h2 webconsole (available only in prototype mode) should nevertheless be disabled by default.

When running in prototype mode, the h2 webconsole module (accessible from the Prototype menu) is automatically made available with the ability to directly query the database. It was felt that it is safer to require the developer to explicitly enable this capability. As of 2.0.0-M8, this can now be done using the 'isis.prototyping.h2-console.web-allow-remote-access' configuration property; the web console will be unavailable without setting this configuration. As an additional safeguard, the new 'isis.prototyping.h2-console.generate-random-web-admin-password' configuration parameter (enabled by default) requires that the administrator use a randomly generated password to use the console. The password is printed to the log, as "webAdminPass: xxx" (where "xxx") is the password. To revert to the original behaviour, the administrator would therefore need to set these configuration parameter: isis.prototyping.h2-console.web-allow-remote-access=true isis.prototyping.h2-console.generate-random-web-admin-password=false Note also that the h2 webconsole is never available in production mode, so these safeguards are only to ensure that the webconsole is secured by default also in prototype mode.

Vendors
-
Not available
Products
-
Metrics (CVSS)
VersionBase scoreBase severityVector
Weaknesses
Attack Patterns
Solution/Workaround
References
HyperlinkResource Type
EPSS History
Score
Latest Score
-
N/A
No data available for selected date range
Percentile
Latest Percentile
-
N/A
No data available for selected date range
Stakeholder-Specific Vulnerability Categorization (SSVC)
▼Common Vulnerabilities and Exposures (CVE)
cve.org
Assigner:apache
Assigner Org ID:f0158376-9dc2-43b6-827c-5f631a4d8d09
Published At:19 Oct, 2022 | 00:00
Updated At:03 Aug, 2024 | 13:10
Rejected At:
▼CVE Numbering Authority (CNA)
h2 webconsole (available only in prototype mode) should nevertheless be disabled by default.

When running in prototype mode, the h2 webconsole module (accessible from the Prototype menu) is automatically made available with the ability to directly query the database. It was felt that it is safer to require the developer to explicitly enable this capability. As of 2.0.0-M8, this can now be done using the 'isis.prototyping.h2-console.web-allow-remote-access' configuration property; the web console will be unavailable without setting this configuration. As an additional safeguard, the new 'isis.prototyping.h2-console.generate-random-web-admin-password' configuration parameter (enabled by default) requires that the administrator use a randomly generated password to use the console. The password is printed to the log, as "webAdminPass: xxx" (where "xxx") is the password. To revert to the original behaviour, the administrator would therefore need to set these configuration parameter: isis.prototyping.h2-console.web-allow-remote-access=true isis.prototyping.h2-console.generate-random-web-admin-password=false Note also that the h2 webconsole is never available in production mode, so these safeguards are only to ensure that the webconsole is secured by default also in prototype mode.

Affected Products
Vendor
The Apache Software FoundationApache Software Foundation
Product
Apache Isis
Versions
Affected
  • From Apache Isis before 2.0.0-M8 (custom)
Problem Types
TypeCWE IDDescription
CWECWE-1188CWE-1188 Insecure Default Initialization of Resource
Type: CWE
CWE ID: CWE-1188
Description: CWE-1188 Insecure Default Initialization of Resource
Metrics
VersionBase scoreBase severityVector
Metrics Other Info
unknown
other:
low
Impacts
CAPEC IDDescription
Solutions

Configurations

Workarounds

Exploits

Credits

William Thomson
Timeline
EventDate
Replaced By

Rejected Reason

References
HyperlinkResource
https://lists.apache.org/thread/jbv2ddt00h7ntlbm6vkk4wdmb31pm8q3
N/A
http://www.openwall.com/lists/oss-security/2022/10/19/1
mailing-list
Hyperlink: https://lists.apache.org/thread/jbv2ddt00h7ntlbm6vkk4wdmb31pm8q3
Resource: N/A
Hyperlink: http://www.openwall.com/lists/oss-security/2022/10/19/1
Resource:
mailing-list
▼Authorized Data Publishers (ADP)
1. CISA ADP Vulnrichment
Affected Products
Vendor
The Apache Software Foundationapache
Product
isis
CPEs
  • cpe:2.3:a:apache:isis:-:*:*:*:*:*:*:*
Default Status
unknown
Versions
Affected
  • From 0 before 2.0.0 (custom)
Problem Types
TypeCWE IDDescription
CWECWE-1188CWE-1188 Insecure Default Initialization of Resource
Type: CWE
CWE ID: CWE-1188
Description: CWE-1188 Insecure Default Initialization of Resource
Metrics
VersionBase scoreBase severityVector
3.15.3MEDIUM
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N
Version: 3.1
Base score: 5.3
Base severity: MEDIUM
Vector:
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N
Metrics Other Info
Impacts
CAPEC IDDescription
Solutions

Configurations

Workarounds

Exploits

Credits

Timeline
EventDate
Replaced By

Rejected Reason

References
HyperlinkResource
2. CVE Program Container
Affected Products
Metrics
VersionBase scoreBase severityVector
Metrics Other Info
Impacts
CAPEC IDDescription
Solutions

Configurations

Workarounds

Exploits

Credits

Timeline
EventDate
Replaced By

Rejected Reason

References
HyperlinkResource
https://lists.apache.org/thread/jbv2ddt00h7ntlbm6vkk4wdmb31pm8q3
x_transferred
http://www.openwall.com/lists/oss-security/2022/10/19/1
mailing-list
x_transferred
Hyperlink: https://lists.apache.org/thread/jbv2ddt00h7ntlbm6vkk4wdmb31pm8q3
Resource:
x_transferred
Hyperlink: http://www.openwall.com/lists/oss-security/2022/10/19/1
Resource:
mailing-list
x_transferred
Information is not available yet
▼National Vulnerability Database (NVD)
nvd.nist.gov
Source:security@apache.org
Published At:19 Oct, 2022 | 08:15
Updated At:01 Aug, 2024 | 13:42

When running in prototype mode, the h2 webconsole module (accessible from the Prototype menu) is automatically made available with the ability to directly query the database. It was felt that it is safer to require the developer to explicitly enable this capability. As of 2.0.0-M8, this can now be done using the 'isis.prototyping.h2-console.web-allow-remote-access' configuration property; the web console will be unavailable without setting this configuration. As an additional safeguard, the new 'isis.prototyping.h2-console.generate-random-web-admin-password' configuration parameter (enabled by default) requires that the administrator use a randomly generated password to use the console. The password is printed to the log, as "webAdminPass: xxx" (where "xxx") is the password. To revert to the original behaviour, the administrator would therefore need to set these configuration parameter: isis.prototyping.h2-console.web-allow-remote-access=true isis.prototyping.h2-console.generate-random-web-admin-password=false Note also that the h2 webconsole is never available in production mode, so these safeguards are only to ensure that the webconsole is secured by default also in prototype mode.

CISA Catalog
Date AddedDue DateVulnerability NameRequired Action
N/A
Date Added: N/A
Due Date: N/A
Vulnerability Name: N/A
Required Action: N/A
Metrics
TypeVersionBase scoreBase severityVector
Primary3.15.3MEDIUM
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N
Secondary3.15.3MEDIUM
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N
Type: Primary
Version: 3.1
Base score: 5.3
Base severity: MEDIUM
Vector:
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N
Type: Secondary
Version: 3.1
Base score: 5.3
Base severity: MEDIUM
Vector:
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N
CPE Matches

The Apache Software Foundation
apache
>>isis>>Versions before 2.0.0(exclusive)
cpe:2.3:a:apache:isis:*:*:*:*:*:*:*:*
The Apache Software Foundation
apache
>>isis>>2.0.0
cpe:2.3:a:apache:isis:2.0.0:milestone1:*:*:*:*:*:*
The Apache Software Foundation
apache
>>isis>>2.0.0
cpe:2.3:a:apache:isis:2.0.0:milestone2:*:*:*:*:*:*
The Apache Software Foundation
apache
>>isis>>2.0.0
cpe:2.3:a:apache:isis:2.0.0:milestone3:*:*:*:*:*:*
The Apache Software Foundation
apache
>>isis>>2.0.0
cpe:2.3:a:apache:isis:2.0.0:milestone4:*:*:*:*:*:*
The Apache Software Foundation
apache
>>isis>>2.0.0
cpe:2.3:a:apache:isis:2.0.0:milestone5:*:*:*:*:*:*
The Apache Software Foundation
apache
>>isis>>2.0.0
cpe:2.3:a:apache:isis:2.0.0:milestone6:*:*:*:*:*:*
The Apache Software Foundation
apache
>>isis>>2.0.0
cpe:2.3:a:apache:isis:2.0.0:milestone7:*:*:*:*:*:*
Weaknesses
CWE IDTypeSource
CWE-1188Primarynvd@nist.gov
CWE-1188Secondarysecurity@apache.org
CWE-1188Secondary134c704f-9b21-4f2e-91b3-4a467353bcc0
CWE ID: CWE-1188
Type: Primary
Source: nvd@nist.gov
CWE ID: CWE-1188
Type: Secondary
Source: security@apache.org
CWE ID: CWE-1188
Type: Secondary
Source: 134c704f-9b21-4f2e-91b3-4a467353bcc0
Evaluator Description

Evaluator Impact

Evaluator Solution

Vendor Statements

References
HyperlinkSourceResource
http://www.openwall.com/lists/oss-security/2022/10/19/1security@apache.org
Mailing List
Third Party Advisory
https://lists.apache.org/thread/jbv2ddt00h7ntlbm6vkk4wdmb31pm8q3security@apache.org
Mailing List
Vendor Advisory
Hyperlink: http://www.openwall.com/lists/oss-security/2022/10/19/1
Source: security@apache.org
Resource:
Mailing List
Third Party Advisory
Hyperlink: https://lists.apache.org/thread/jbv2ddt00h7ntlbm6vkk4wdmb31pm8q3
Source: security@apache.org
Resource:
Mailing List
Vendor Advisory

Change History

0
Information is not available yet

Similar CVEs

55Records found

CVE-2019-19251
Matching Score-4
Assigner-MITRE Corporation
ShareView Details
Matching Score-4
Assigner-MITRE Corporation
CVSS Score-5.3||MEDIUM
EPSS-0.15% / 36.29%
||
7 Day CHG~0.00%
Published-10 Dec, 2019 | 14:26
Updated-05 Aug, 2024 | 02:09
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

The Last.fm desktop app (Last.fm Scrobbler) through 2.1.39 on macOS makes HTTP requests that include an API key without the use of SSL/TLS. Although there is an Enable SSL option, it is disabled by default, and cleartext requests are made as soon as the app starts.

Action-Not Available
Vendor-last.fmn/a
Product-last.fm_desktopn/a
CWE ID-CWE-1188
Initialization of a Resource with an Insecure Default
CWE ID-CWE-319
Cleartext Transmission of Sensitive Information
CVE-2023-40708
Matching Score-4
Assigner-Dragos, Inc.
ShareView Details
Matching Score-4
Assigner-Dragos, Inc.
CVSS Score-5.8||MEDIUM
EPSS-0.11% / 29.61%
||
7 Day CHG~0.00%
Published-24 Aug, 2023 | 16:08
Updated-02 Oct, 2024 | 20:20
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Improper Access Control in OPTO 22 SNAP PAC S1

The File Transfer Protocol (FTP) port is open by default in the SNAP PAC S1 Firmware version R10.3b. This could allow an adversary to access some device files.

Action-Not Available
Vendor-opto22OPTO 22opto22
Product-snap_pac_s1snap_pac_s1_firmwareSNAP PAC S1snap_pac_s1
CWE ID-CWE-1188
Initialization of a Resource with an Insecure Default
CVE-2023-28978
Matching Score-4
Assigner-Juniper Networks, Inc.
ShareView Details
Matching Score-4
Assigner-Juniper Networks, Inc.
CVSS Score-5.3||MEDIUM
EPSS-0.28% / 50.74%
||
7 Day CHG~0.00%
Published-17 Apr, 2023 | 00:00
Updated-05 Feb, 2025 | 21:42
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Junos OS Evolved: Read access to some confidential user information is possible

An Insecure Default Initialization of Resource vulnerability in Juniper Networks Junos OS Evolved allows an unauthenticated, network based attacker to read certain confidential information. In the default configuration it is possible to read confidential information about locally configured (administrative) users of the affected system. This issue affects Juniper Networks Junos OS Evolved: All versions prior to 20.4R3-S7-EVO on pending commit???; 21.1-EVO versions prior to 21.1R3-S4-EVO on awaiting build; 21.4-EVO versions prior to 21.4R3-S1-EVO; 22.2-EVO versions prior to 22.2R3-EVO; 21.2-EVO versions prior to 21.2R3-S5-EVO on pending commit???; 21.3-EVO version 21.3R1-EVO and later versions; 22.1-EVO version 22.1R1-EVO and later versions; 22.2-EVO versions prior to 22.2R2-S1-EVO.

Action-Not Available
Vendor-Juniper Networks, Inc.
Product-junos_os_evolvedJunos OS Evolved
CWE ID-CWE-1188
Initialization of a Resource with an Insecure Default
CVE-2025-53602
Matching Score-4
Assigner-MITRE Corporation
ShareView Details
Matching Score-4
Assigner-MITRE Corporation
CVSS Score-5.3||MEDIUM
EPSS-0.04% / 10.44%
||
7 Day CHG~0.00%
Published-04 Jul, 2025 | 00:00
Updated-08 Jul, 2025 | 16:18
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Zipkin through 3.5.1 has a /heapdump endpoint (associated with the use of Spring Boot Actuator), a similar issue to CVE-2025-48927.

Action-Not Available
Vendor-Open Zipkin
Product-Zipkin
CWE ID-CWE-1188
Initialization of a Resource with an Insecure Default
CVE-2025-48927
Matching Score-4
Assigner-MITRE Corporation
ShareView Details
Matching Score-4
Assigner-MITRE Corporation
CVSS Score-5.3||MEDIUM
EPSS-9.38% / 92.46%
||
7 Day CHG~0.00%
Published-28 May, 2025 | 00:00
Updated-30 Jul, 2025 | 01:36
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Known KEV||Action Due Date - 2025-07-22||Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable.

The TeleMessage service through 2025-05-05 configures Spring Boot Actuator with an exposed heap dump endpoint at a /heapdump URI, as exploited in the wild in May 2025.

Action-Not Available
Vendor-smarshTeleMessage
Product-telemessageserviceTM SGNL
CWE ID-CWE-1188
Initialization of a Resource with an Insecure Default
  • Previous
  • 1
  • 2
  • Next
Details not found