HomePostgresqlCVE-2022-2625

CVE-2022-2625

HIGH
8.0CVSS
Published: 2022-08-18
Updated: 2024-11-21
AI Analysis

Description

A vulnerability was found in PostgreSQL. This attack requires permission to create non-temporary objects in at least one schema, the ability to lure or wait for an administrator to create or update an affected extension in that schema, and the ability to lure or wait for a victim to use the object targeted in CREATE OR REPLACE or CREATE IF NOT EXISTS. Given all three prerequisites, this flaw allows an attacker to run arbitrary code as the victim role, which may be a superuser.

CVSS Metrics

Vector
CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H
Attack Vector
network
Complexity
low
Privileges
low
User Action
required
Scope
unchanged
Confidentiality
high
Integrity
high
Availability
high
Weaknesses
CWE-915CWE-1321

Metadata

Primary Vendor
POSTGRESQL
Published
8/18/2022
Last Modified
11/21/2024
Source
NIST NVD
Note: Verify all details with official vendor sources before applying patches.

Affected Products

postgresql : postgresqlpostgresql : postgresqlpostgresql : postgresqlpostgresql : postgresqlpostgresql : postgresqlpostgresql : postgresqlpostgresql : postgresqlfedoraproject : fedoraredhat : enterprise_linuxredhat : enterprise_linuxredhat : enterprise_linuxredhat : enterprise_linux

AI-Powered Remediation

Generate remediation guidance or a C-suite brief for this vulnerability.

Executive Intelligence Brief

CVE-CVE-2022-2625 | HIGH Severity | CVEDatabase.com | CVEDatabase.com