CVE-2022-31764

8.5 HIGH

📋 TL;DR

This vulnerability allows authenticated attackers to execute arbitrary code on Apache ShardingSphere ElasticJob-UI servers by exploiting a flaw in H2 database JDBC URL parsing. It affects all ElasticJob-UI versions up to 3.0.1. Attackers must first obtain valid credentials to exploit this vulnerability.

💻 Affected Systems

Products:
  • Apache ShardingSphere ElasticJob-UI
Versions: 3.0.1 and all prior versions
Operating Systems: All operating systems running ElasticJob-UI
Default Config Vulnerable: ⚠️ Yes
Notes: Requires attacker to have valid account credentials. The Lite UI component is specifically vulnerable.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Full system compromise allowing attackers to execute arbitrary commands, steal sensitive data, deploy malware, or pivot to other systems in the network.

🟠

Likely Case

Attackers with stolen credentials gain remote code execution, potentially leading to data exfiltration, service disruption, or installation of backdoors.

🟢

If Mitigated

With strong authentication controls and network segmentation, impact is limited to the ElasticJob-UI service itself.

🌐 Internet-Facing: HIGH if exposed to internet with weak credentials, as authenticated attackers can achieve RCE.
🏢 Internal Only: MEDIUM as attackers still need valid credentials, but internal threats or credential theft could lead to exploitation.

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: MEDIUM

Exploitation requires valid credentials and knowledge of constructing malicious H2 JDBC URLs. No public exploit code is known.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: ElasticJob-UI 3.0.2

Vendor Advisory: https://lists.apache.org/thread/pg0k223m4hsnnzg4nh7lxvdxxgbkrlqb

Restart Required: No

Instructions:

1. Download ElasticJob-UI 3.0.2 from Apache ShardingSphere releases. 2. Replace existing ElasticJob-UI installation with the patched version. 3. Verify the update by checking the version in the UI or configuration files.

🔧 Temporary Workarounds

Disable Lite UI

all

Temporarily disable the vulnerable Lite UI component if not required for operations.

Modify ElasticJob-UI configuration to disable Lite UI or restrict access to its endpoints

Network Access Control

all

Restrict network access to ElasticJob-UI to only trusted IP addresses or internal networks.

Configure firewall rules to limit inbound connections to ElasticJob-UI ports

🧯 If You Can't Patch

  • Implement strong authentication controls and regularly rotate credentials
  • Isolate ElasticJob-UI servers in a segmented network zone with strict egress filtering

🔍 How to Verify

Check if Vulnerable:

Check ElasticJob-UI version in web interface or configuration files. Versions 3.0.1 or earlier are vulnerable.

Check Version:

Check web interface or examine configuration files for version information

Verify Fix Applied:

Verify version is 3.0.2 or later. Test that H2 JDBC URL functionality in Lite UI no longer accepts malicious inputs.

📡 Detection & Monitoring

Log Indicators:

  • Unusual H2 database connection attempts
  • Suspicious JDBC URL patterns in logs
  • Authentication attempts from unexpected sources

Network Indicators:

  • Unexpected outbound connections from ElasticJob-UI servers
  • Traffic to unusual ports or external IPs

SIEM Query:

Search for ElasticJob-UI logs containing H2 JDBC URL patterns or authentication events from suspicious IPs

🔗 References

📤 Share & Export