CVE-2022-26520
moderate-risk
Published 2022-03-10
In pgjdbc before 42.3.3, an attacker (who controls the jdbc URL or properties) can call java.util.logging.FileHandler to write to arbitrary files through the loggerFile and loggerLevel connection properties. An example situation is that an attacker could create an executable JSP file under a Tomcat web root. NOTE: the vendor's position is that there is no pgjdbc vulnerability; instead, it is a vulnerability for any application to use the pgjdbc driver with untrusted connection properties
Do I need to act?
~
1.3% chance of exploitation in next 30 days
EPSS score — moderate exploit probability
-
Not on CISA KEV list
No confirmed active exploitation reported to CISA
+
Fix available
Upgrade to: 9effea487dca529dc5cb0e71600a8c6509819c56
9
CVSS 9.8/10
Critical
NETWORK
/ LOW complexity
Affected Products (3)
Affected Vendors
References (10)
Third Party Advisory
https://github.com/pgjdbc/pgjdbc/security/advisories/GHSA-673j-qm5f-xpv8
Vendor Advisory
https://jdbc.postgresql.org/documentation/head/tomcat.html
Third Party Advisory
https://www.debian.org/security/2022/dsa-5196
Third Party Advisory
https://github.com/pgjdbc/pgjdbc/security/advisories/GHSA-673j-qm5f-xpv8
Vendor Advisory
https://jdbc.postgresql.org/documentation/head/tomcat.html
Third Party Advisory
https://www.debian.org/security/2022/dsa-5196
45
/ 100
moderate-risk
Severity
32/34 · Critical
Exploitability
4/34 · Minimal
Exposure
9/34 · Low