CVE-2021-23222 - log back

CVE-2021-23222 edited at 11 Nov 2021 14:34:52
Severity
- Unknown
+ Low
Remote
- Unknown
+ Remote
Type
- Unknown
+ Man-in-the-middle
Description
+ A security issue has been found in PostgreSQL versions 9.6 up to 14. A man-in-the-middle attacker can inject false responses to the client's first few queries, despite the use of SSL certificate verification and encryption.
+
+ If more preconditions hold, the attacker can exfiltrate the client's password or other confidential data that might be transmitted early in a session. The attacker must have a way to trick the client's intended server into making the confidential data accessible to the attacker. A known implementation having that property is a PostgreSQL configuration vulnerable to CVE-2021-32029. As with any exploitation of CVE-2021-32029, the server must be using trust authentication with a clientcert requirement or using cert authentication. To disclose a password, the client must be in possession of a password, which is atypical when using an authentication configuration vulnerable to CVE-2021-32029. The attacker must have some other way to access the server to retrieve the exfiltrated data (a valid, unprivileged login account would be sufficient).
References
+ https://www.postgresql.org/support/security/CVE-2021-23222/
+ https://git.postgresql.org/gitweb/?p=postgresql.git;a=commitdiff;h=160c0258802d10b0600d7671b1bbea55d8e17d45
CVE-2021-23222 created at 11 Nov 2021 14:28:32