Total vulnerabilities in the database
When the server is configured to use trust authentication with a clientcert requirement or to use cert authentication, a man-in-the-middle attacker can inject arbitrary SQL queries when a connection is first established, despite the use of SSL certificate verification and encryption.
Software | From | Fixed in |
---|---|---|
postgresql / postgresql | 10.0 | 10.19 |
postgresql / postgresql | 11.0 | 11.14 |
postgresql / postgresql | 12.0 | 12.9 |
postgresql / postgresql | 13.0 | 13.5 |
postgresql / postgresql | 14.0 | 14.0.x |
postgresql / postgresql | - | 9.6.24 |
fedoraproject / fedora | 34 | 34.x |
fedoraproject / fedora | 35 | 35.x |
redhat / software_collections | 1.0 | 1.0.x |
redhat / enterprise_linux | 8.0 | 8.0.x |
redhat / enterprise_linux_for_power_little_endian | 8.0 | 8.0.x |
redhat / enterprise_linux_for_ibm_z_systems | 8.0 | 8.0.x |