First published: Tue Feb 01 2022(Updated: )
PostgreSQL JDBC Driver (PgJDBC) could allow a remote authenticated attacker to execute arbitrary code on the system, caused by an unchecked class instantiation when providing plugin classes. By sending a specially-crafted request using the "authenticationPluginClassName", "sslhostnameverifier", "socketFactory", "sslfactory", "sslpasswordcallback" classes, an attacker could exploit this vulnerability to execute arbitrary code on the system.
Credit: security-advisories@github.com
Affected Software | Affected Version | How to fix |
---|---|---|
IBM Disconnected Log Collector | <=v1.0 - v1.8.2 | |
Postgresql Postgresql Jdbc Driver | <42.2.25 | |
Postgresql Postgresql Jdbc Driver | >=42.3.0<42.3.2 | |
Postgresql Postgresql Jdbc Driver | =42.3.2-rc1 | |
Fedoraproject Fedora | =35 | |
Quarkus Quarkus | <2.7.2 | |
Debian Debian Linux | =9.0 | |
Debian Debian Linux | =10.0 | |
Debian Debian Linux | =11.0 | |
debian/libpgjava | 42.2.5-2+deb10u1 42.2.5-2+deb10u3 42.2.15-1+deb11u1 42.5.4-1 42.6.0-2 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
(Appears in the following advisories)
CVE-2022-21724 is a vulnerability in the PostgreSQL JDBC Driver (PgJDBC) that could allow a remote authenticated attacker to execute arbitrary code.
The vulnerability in CVE-2022-21724 occurs when the jdbc url or properties are controlled by the attacker, which can lead to the execution of arbitrary code.
The severity of CVE-2022-21724 is high, with a CVSS base score of 8.5.
The PostgreSQL JDBC Driver versions up to and exclusive of 42.2.25 and 42.3.2 are affected by CVE-2022-21724.
To fix the vulnerability in CVE-2022-21724, you should update the PostgreSQL JDBC Driver to version 42.2.25 or higher.