In pgjdbc before 42.3.3, an attacker (who controls the jdbc URL or properties) can call java.util.logging.FileHandler to write to arbitrary files through the loggerFile and loggerLevel connection properties. An example situation is that an attacker could create an executable JSP file under a Tomcat web root. NOTE: the vendor's position is that there is no pgjdbc vulnerability; instead, it is a vulnerability for any application to use the pgjdbc driver with untrusted connection properties
Advisories
Source ID Title
Debian DSA Debian DSA DSA-5196-1 libpgjava security update
Github GHSA Github GHSA GHSA-727h-hrw8-jg8q Path traversal in org.postgresql:postgresql
Fixes

Solution

No solution given by the vendor.


Workaround

No workaround given by the vendor.

History

No history.

cve-icon MITRE

Status: PUBLISHED

Assigner: mitre

Published:

Updated: 2024-08-03T05:03:32.964Z

Reserved: 2022-03-06T00:00:00

Link: CVE-2022-26520

cve-icon Vulnrichment

No data.

cve-icon NVD

Status : Modified

Published: 2022-03-10T17:47:45.810

Modified: 2024-11-21T06:54:06.487

Link: CVE-2022-26520

cve-icon Redhat

Severity : Moderate

Publid Date: 2022-02-01T00:00:00Z

Links: CVE-2022-26520 - Bugzilla

cve-icon OpenCVE Enrichment

No data.