You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
In org.postgresql:postgresql before 42.3.3 the connection properties for configuring a pgjdbc connection are not meant to be exposed to an unauthenticated attacker. While allowing an attacker to specify arbitrary connection properties could lead to a compromise of a system, that's a defect of an application that allows unauthenticated attackers that level of control.
mend-bolt-for-githubbot
changed the title
WS-2022-0080 (High) detected in postgresql-42.2.5.jar
WS-2022-0080 (Critical) detected in postgresql-42.2.5.jar
Mar 29, 2024
WS-2022-0080 - Critical Severity Vulnerability
Vulnerable Library - postgresql-42.2.5.jar
Java JDBC 4.2 (JRE 8+) driver for PostgreSQL database
Library home page: https://github.com/pgjdbc/pgjdbc
Path to dependency file: /pom.xml
Path to vulnerable library: /downloadResource_be9e7f78-c1b5-4680-921c-c131e1f3bfc0/20200212161000/postgresql-42.2.5.jar
Dependency Hierarchy:
Found in HEAD commit: 704cf8c77cf1b31b5b84af2b3eec982716c61645
Found in base branch: master
Vulnerability Details
In org.postgresql:postgresql before 42.3.3 the connection properties for configuring a pgjdbc connection are not meant to be exposed to an unauthenticated attacker. While allowing an attacker to specify arbitrary connection properties could lead to a compromise of a system, that's a defect of an application that allows unauthenticated attackers that level of control.
Publish Date: 2022-02-16
URL: WS-2022-0080
CVSS 3 Score Details (9.8)
Base Score Metrics:
Suggested Fix
Type: Upgrade version
Origin: GHSA-673j-qm5f-xpv8
Release Date: 2022-02-16
Fix Resolution: 42.2.8
Step up your Open Source Security Game with Mend here
The text was updated successfully, but these errors were encountered: