Advisory Database
  • Advisories
  • Dependency Scanning
  1. maven
  2. ›
  3. org.postgresql/postgresql
  4. ›
  5. CVE-2022-26520

CVE-2022-26520: Path traversal in org.postgresql:postgresql

March 11, 2022 (updated September 8, 2022)

** DISPUTED ** In pgjdbc before 42.3.3, an attacker (who controls the jdbc URL or properties) can call java.util.logging.FileHandler to write to arbitrary files through the loggerFile and loggerLevel connection properties. An example situation is that an attacker could create an executable JSP file under a Tomcat web root. NOTE: the vendor’s position is that there is no pgjdbc vulnerability; instead, it is a vulnerability for any application to use the pgjdbc driver with untrusted connection properties.

References

  • github.com/advisories/GHSA-727h-hrw8-jg8q
  • github.com/pgjdbc/pgjdbc/pull/2454/commits/017b929977b4f85795f9ad2fa5de6e80978b8ccc
  • github.com/pgjdbc/pgjdbc/security/advisories/GHSA-673j-qm5f-xpv8
  • jdbc.postgresql.org/documentation/changelog.html
  • jdbc.postgresql.org/documentation/head/tomcat.html
  • nvd.nist.gov/vuln/detail/CVE-2022-26520
  • www.debian.org/security/2022/dsa-5196

Code Behaviors & Features

Detect and mitigate CVE-2022-26520 with GitLab Dependency Scanning

Secure your software supply chain by verifying that all open source dependencies used in your projects contain no disclosed vulnerabilities. Learn more about Dependency Scanning →

Affected versions

All versions starting from 42.1.0 before 42.3.3

Fixed versions

  • 42.3.3

Solution

Upgrade to version 42.3.3 or above.

Impact 9.8 CRITICAL

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H

Learn more about CVSS

Source file

maven/org.postgresql/postgresql/CVE-2022-26520.yml

Spotted a mistake? Edit the file on GitLab.

  • Site Repo
  • About GitLab
  • Terms
  • Privacy Statement
  • Contact

Page generated Wed, 14 May 2025 12:15:30 +0000.