When the server is configured to use trust authentication...
High severity Unreviewed PublishedMar 5, 2022 to the GitHub Advisory Database • UpdatedFeb 2, 2023
Description
When the server is configured to use trust authentication with a clientcert requirement or to use cert authentication, a man-in-the-middle attacker can inject arbitrary SQL queries when a connection is first established, despite the use of SSL certificate verification and encryption.
References
- https://nvd.nist.gov/vuln/detail/CVE-2021-23214
- postgres/postgres@28e2412
- https://bugzilla.redhat.com/show_bug.cgi?id=2022666
- https://git.postgresql.org/gitweb/?p=postgresql.git;a=commit;h=28e24125541545483093819efae9bca603441951
- https://www.postgresql.org/support/security/CVE-2021-23214/
- https://security.gentoo.org/glsa/202211-04
Published by theNational Vulnerability DatabaseMar 4, 2022
Published to the GitHub Advisory DatabaseMar 5, 2022
Last updatedFeb 2, 2023
Severity
High / 10
CVSS v3 base metrics
Attack vector
Network
Attack complexity
High
Privileges required
None
User interaction
None
Scope
Unchanged
Confidentiality
High
Integrity
High
Availability
High
CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H
EPSS score
(68th percentile)
Weaknesses
WeaknessCWE-89
Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')
The product constructs all or part of an SQL command using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify the intended SQL command when it is sent to a downstream component.Learn more on MITRE.CVE ID
CVE-2021-23214
GHSA ID
GHSA-467w-rrqc-395f
Source code
No known source code
Dependabot alerts are not supported on this advisory because it does not have a package from a supported ecosystem with an affected and fixed version.
LoadingChecking history
Uh oh!
There was an error while loading.Please reload this page.
See something to contribute?Suggest improvements for this vulnerability.