pgjdbc is an open source postgresql JDBC Driver. In affected versions a prepared statement using either `PreparedStatement.setText(int, InputStream)` or `PreparedStatemet.setBytea(int, InputStream)` will create a temporary file if the InputStream is larger than 2k. This will create a temporary file which is readable by other users on Unix like systems, but not MacOS. On Unix like systems, the system's temporary directory is shared between all users on that system. Because of this, when files and directories are written into this directory they are, by default, readable by other users on that same system. This vulnerability does not allow other users to overwrite the contents of these directories or files. This is purely an information disclosure vulnerability. Because certain JDK file system APIs were only added in JDK 1.7, this this fix is dependent upon the version of the JDK you are using. Java 1.7 and higher users: this vulnerability is fixed in 4.5.0. Java 1.6 and lower users: no patch is available. If you are unable to patch, or are stuck running on Java 1.6, specifying the java.io.tmpdir system environment variable to a directory that is exclusively owned by the executing user will mitigate this vulnerability.
References
Configurations
Configuration 1 (hide)
|
Configuration 2 (hide)
|
History
29 Mar 2024, 13:15
Type | Values Removed | Values Added |
---|---|---|
References |
|
06 Jul 2023, 13:37
Type | Values Removed | Values Added |
---|---|---|
CWE | CWE-200 |
CWE-668 |
23 Feb 2023, 02:31
Type | Values Removed | Values Added |
---|---|---|
CPE | cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:* | |
References |
|
|
References | (MLIST) https://lists.debian.org/debian-lts-announce/2022/12/msg00003.html - Mailing List, Third Party Advisory |
03 Dec 2022, 01:15
Type | Values Removed | Values Added |
---|---|---|
References |
|
|
CWE | CWE-377 CWE-200 |
28 Nov 2022, 19:43
Type | Values Removed | Values Added |
---|---|---|
References | (CONFIRM) https://github.com/pgjdbc/pgjdbc/security/advisories/GHSA-562r-vg33-8x8h - Exploit, Patch, Third Party Advisory | |
References | (MISC) https://github.com/pgjdbc/pgjdbc/commit/9008dc9aade6dbfe4efafcd6872ebc55f4699cf5 - Patch, Third Party Advisory | |
CWE | CWE-200 |
NVD-CWE-Other |
CPE | cpe:2.3:a:postgresql:postgresql_jdbc_driver:*:*:*:*:*:*:*:* cpe:2.3:a:postgresql:postgresql_jdbc_driver:42.5.0:-:*:*:*:*:*:* cpe:2.3:a:postgresql:postgresql_jdbc_driver:42.5.0:rc1:*:*:*:*:*:* |
|
CVSS |
v2 : v3 : |
v2 : unknown
v3 : 5.5 |
23 Nov 2022, 20:41
Type | Values Removed | Values Added |
---|---|---|
New CVE |
Information
Published : 2022-11-23 20:15
Updated : 2024-03-29 13:15
NVD link : CVE-2022-41946
Mitre link : CVE-2022-41946
CVE.ORG link : CVE-2022-41946
JSON object : View
Products Affected
postgresql
- postgresql_jdbc_driver
debian
- debian_linux