Executive Summary

Informations
Name CVE-2022-21724 First vendor Publication 2022-02-02
Vendor Cve Last vendor Modification 2025-05-05

Security-Database Scoring CVSS v3

Cvss vector : CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
Overall CVSS Score 9.8
Base Score 9.8 Environmental Score 9.8
impact SubScore 5.9 Temporal Score 9.8
Exploitabality Sub Score 3.9
 
Attack Vector Network Attack Complexity Low
Privileges Required None User Interaction None
Scope Unchanged Confidentiality Impact High
Integrity Impact High Availability Impact High
Calculate full CVSS 3.0 Vectors scores

Security-Database Scoring CVSS v2

Cvss vector : (AV:N/AC:L/Au:N/C:P/I:P/A:P)
Cvss Base Score 7.5 Attack Range Network
Cvss Impact Score 6.4 Attack Complexity Low
Cvss Expoit Score 10 Authentication None Required
Calculate full CVSS 2.0 Vectors scores

Detail

pgjdbc is the offical PostgreSQL JDBC Driver. A security hole was found in the jdbc driver for postgresql database while doing security research. The system using the postgresql library will be attacked when attacker control the jdbc url or properties. pgjdbc instantiates plugin instances based on class names provided via `authenticationPluginClassName`, `sslhostnameverifier`, `socketFactory`, `sslfactory`, `sslpasswordcallback` connection properties. However, the driver did not verify if the class implements the expected interface before instantiating the class. This can lead to code execution loaded via arbitrary classes. Users using plugins are advised to upgrade. There are no known workarounds for this issue.

Original Source

Url : http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21724

CWE : Common Weakness Enumeration

% Id Name
100 % CWE-665 Improper Initialization

CPE : Common Platform Enumeration

TypeDescriptionCount
Application 3
Application 2
Os 3
Os 1

Sources (Detail)

https://github.com/pgjdbc/pgjdbc/commit/f4d0ed69c0b3aae8531d83d6af4c57f22312c813
https://github.com/pgjdbc/pgjdbc/security/advisories/GHSA-v7wg-cpwc-24m4
https://lists.debian.org/debian-lts-announce/2022/05/msg00027.html
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedora...
https://security.netapp.com/advisory/ntap-20220311-0005/
https://www.debian.org/security/2022/dsa-5196
Source Url

Alert History

If you want to see full details history, please login or register.
0
1
2
3
4
5
6
7
8
9
10
11
12
Date Informations
2025-05-27 01:54:52
  • Multiple Updates
2024-11-28 14:06:16
  • Multiple Updates
2023-11-07 21:32:59
  • Multiple Updates
2022-11-10 00:27:32
  • Multiple Updates
2022-08-01 17:27:30
  • Multiple Updates
2022-05-27 21:27:31
  • Multiple Updates
2022-05-21 05:27:37
  • Multiple Updates
2022-04-15 00:23:11
  • Multiple Updates
2022-03-30 21:23:12
  • Multiple Updates
2022-03-11 13:23:18
  • Multiple Updates
2022-02-08 00:22:55
  • Multiple Updates
2022-02-07 21:22:56
  • Multiple Updates
2022-02-02 17:22:54
  • First insertion