Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

fstec логотип

BDU:2022-05174

Опубликовано: 03 авг. 2022
Источник: fstec
CVSS3: 7.1
CVSS2: 7.1
EPSS Низкий

Описание

Уязвимость реализации метода "java.sql.ResultRow.refreshRow()" драйвера JDBC (PgJDBC) связана с непринятием мер по защите структуры SQL-запроса. Эксплуатация уязвимости может позволить нарушителю, действующему удалённо, выполнить произвольный код путем отправки специально созданного SQL-запроса

Вендор

PostgreSQL Global Development Group
Cloud Foundry Foundation
АО "НППКТ"

Наименование ПО

pgjdbc
UAA
ОСОН ОСнова Оnyx

Версия ПО

до 42.4.1 (pgjdbc)
до 42.2.26 (pgjdbc)
до 75.23.0 (UAA)
до 2.6 (ОСОН ОСнова Оnyx)

Тип ПО

Сетевое средство
Прикладное ПО информационных систем
Операционная система

Операционные системы и аппаратные платформы

АО "НППКТ" ОСОН ОСнова Оnyx до 2.6

Уровень опасности уязвимости

Высокий уровень опасности (базовая оценка CVSS 2.0 составляет 7,1)
Высокий уровень опасности (базовая оценка CVSS 3.0 составляет 7,1)

Возможные меры по устранению уязвимости

Обновление программного обеспечения до версий 42.2.26, 42.4.1 и выше
Для Cloud Foundry UAA:
https://github.com/cloudfoundry/uaa/releases/tag/v75.23.0
Для ОСОН ОСнова Оnyx:
Обновление программного обеспечения libpgjava до версии 42.2.5-2+deb10u2

Статус уязвимости

Подтверждена производителем

Наличие эксплойта

Существует в открытом доступе

Информация об устранении

Уязвимость устранена

Идентификаторы других систем описаний уязвимостей

EPSS

Процентиль: 75%
0.00911
Низкий

7.1 High

CVSS3

7.1 High

CVSS2

Связанные уязвимости

CVSS3: 7.1
ubuntu
около 3 лет назад

PostgreSQL JDBC Driver (PgJDBC for short) allows Java programs to connect to a PostgreSQL database using standard, database independent Java code. The PGJDBC implementation of the `java.sql.ResultRow.refreshRow()` method is not performing escaping of column names so a malicious column name that contains a statement terminator, e.g. `;`, could lead to SQL injection. This could lead to executing additional SQL commands as the application's JDBC user. User applications that do not invoke the `ResultSet.refreshRow()` method are not impacted. User application that do invoke that method are impacted if the underlying database that they are querying via their JDBC application may be under the control of an attacker. The attack requires the attacker to trick the user into executing SQL against a table name who's column names would contain the malicious SQL and subsequently invoke the `refreshRow()` method on the ResultSet. Note that the application's JDBC user and the schema owner need not ...

CVSS3: 8
redhat
около 3 лет назад

PostgreSQL JDBC Driver (PgJDBC for short) allows Java programs to connect to a PostgreSQL database using standard, database independent Java code. The PGJDBC implementation of the `java.sql.ResultRow.refreshRow()` method is not performing escaping of column names so a malicious column name that contains a statement terminator, e.g. `;`, could lead to SQL injection. This could lead to executing additional SQL commands as the application's JDBC user. User applications that do not invoke the `ResultSet.refreshRow()` method are not impacted. User application that do invoke that method are impacted if the underlying database that they are querying via their JDBC application may be under the control of an attacker. The attack requires the attacker to trick the user into executing SQL against a table name who's column names would contain the malicious SQL and subsequently invoke the `refreshRow()` method on the ResultSet. Note that the application's JDBC user and the schema owner need not ...

CVSS3: 7.1
nvd
около 3 лет назад

PostgreSQL JDBC Driver (PgJDBC for short) allows Java programs to connect to a PostgreSQL database using standard, database independent Java code. The PGJDBC implementation of the `java.sql.ResultRow.refreshRow()` method is not performing escaping of column names so a malicious column name that contains a statement terminator, e.g. `;`, could lead to SQL injection. This could lead to executing additional SQL commands as the application's JDBC user. User applications that do not invoke the `ResultSet.refreshRow()` method are not impacted. User application that do invoke that method are impacted if the underlying database that they are querying via their JDBC application may be under the control of an attacker. The attack requires the attacker to trick the user into executing SQL against a table name who's column names would contain the malicious SQL and subsequently invoke the `refreshRow()` method on the ResultSet. Note that the application's JDBC user and the schema owner need not be

CVSS3: 7.1
debian
около 3 лет назад

PostgreSQL JDBC Driver (PgJDBC for short) allows Java programs to conn ...

suse-cvrf
почти 3 года назад

Security update for postgresql-jdbc

EPSS

Процентиль: 75%
0.00911
Низкий

7.1 High

CVSS3

7.1 High

CVSS2