You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
pgjdbc is the offical PostgreSQL JDBC Driver. A security hole was found in the jdbc driver for postgresql database while doing security research. The system using the postgresql library will be attacked when attacker control the jdbc url or properties. pgjdbc instantiates plugin instances based on class names provided via authenticationPluginClassName, sslhostnameverifier, socketFactory, sslfactory, sslpasswordcallback connection properties. However, the driver did not verify if the class implements the expected interface before instantiating the class. This can lead to code execution loaded via arbitrary classes. Users using plugins are advised to upgrade. There are no known workarounds for this issue.
Thank you for opening an issue. If this issue is related to a bug, please follow the steps and provide the information outlined in the Troubleshooting Guide. Failure to follow these instructions may result in automatic closing of this issue.
mend-bolt-for-githubbot
changed the title
CVE-2022-21724 (High) detected in postgresql-42.2.23.jar
CVE-2022-21724 (Critical) detected in postgresql-42.2.23.jar
Dec 28, 2023
CVE-2022-21724 - Critical Severity Vulnerability
PostgreSQL JDBC Driver Postgresql
Library home page: https://jdbc.postgresql.org
Dependency Hierarchy:
Found in HEAD commit: 2cda59cc9ba15234ad74bb5750717c564aad3b18
Found in base branch: master
pgjdbc is the offical PostgreSQL JDBC Driver. A security hole was found in the jdbc driver for postgresql database while doing security research. The system using the postgresql library will be attacked when attacker control the jdbc url or properties. pgjdbc instantiates plugin instances based on class names provided via
authenticationPluginClassName
,sslhostnameverifier
,socketFactory
,sslfactory
,sslpasswordcallback
connection properties. However, the driver did not verify if the class implements the expected interface before instantiating the class. This can lead to code execution loaded via arbitrary classes. Users using plugins are advised to upgrade. There are no known workarounds for this issue.Publish Date: 2022-02-02
URL: CVE-2022-21724
Base Score Metrics:
Type: Upgrade version
Origin: GHSA-v7wg-cpwc-24m4
Release Date: 2022-02-02
Fix Resolution: 42.2.23.jre6
Step up your Open Source Security Game with Mend here
The text was updated successfully, but these errors were encountered: