[ https://issues.apache.org/jira/browse/HIVE-27501?page=com.atlassian.jira.plugin.system.issuetabpanels:all-tabpanel ]
Diksha updated HIVE-27501: -------------------------- Description: The web-based admin console in H2 Database Engine through 2.1.214 can be started via the CLI with the argument -webAdminPassword, which allows the user to specify the password in cleartext for the web admin console. Consequently, a local user (or an attacker that has obtained local access through some means) would be able to discover the password by listing processes and their arguments. (was: The web-based admin console in H2 Database Engine through 2.1.214 can be started via the CLI with the argument -webAdminPassword, which allows the user to specify the password in cleartext for the web admin console. Consequently, a local user (or an attacker that has obtained local access through some means) would be able to discover the password by listing processes and their arguments. NOTE: the vendor states "This is not a vulnerability of H2 Console ... Passwords should never be passed on the command line and every qualified DBA or system administrator is expected to know that.") > CVE-2022-45868: upgraded h2database version to 2.2.220 > ------------------------------------------------------ > > Key: HIVE-27501 > URL: https://issues.apache.org/jira/browse/HIVE-27501 > Project: Hive > Issue Type: Task > Reporter: Diksha > Assignee: Diksha > Priority: Major > > The web-based admin console in H2 Database Engine through 2.1.214 can be > started via the CLI with the argument -webAdminPassword, which allows the > user to specify the password in cleartext for the web admin console. > Consequently, a local user (or an attacker that has obtained local access > through some means) would be able to discover the password by listing > processes and their arguments. -- This message was sent by Atlassian Jira (v8.20.10#820010)