PostgreSQL JDBC Driver 代码问题漏洞
CNNVD-ID编号 | CNNVD-202006-453 | CVE编号 | CVE-2020-13692 |
发布时间 | 2020-06-04 | 更新时间 | 2021-01-15 |
漏洞类型 | 代码问题 | 漏洞来源 | N/A |
危险等级 | 高危 | 威胁类型 | 远程 |
厂商 | N/A |
漏洞介绍
PostgreSQL是PostgreSQL组织的一套自由的对象关系型数据库管理系统。该系统支持大部分SQL标准并且提供了许多其他特性,例如外键、触发器、视图等。
PostgreSQL JDBC Driver (PgJDBC) 42.2.13之前版本中存在代码问题漏洞,该漏洞源于程序没有正确处理XML外部实体。远程攻击者可借助特制数据利用该漏洞获取敏感信息。
漏洞补丁
目前厂商已发布升级了PostgreSQL JDBC Driver 代码问题漏洞的补丁,PostgreSQL JDBC Driver 代码问题漏洞的补丁获取链接:
https://jdbc.postgresql.org/documentation/changelog.html#version_42.2.13
参考网址
来源:MLIST
来源:FEDORA
来源:MLIST
来源:CONFIRM
链接:https://security.netapp.com/advisory/ntap-20200619-0005/
来源:CONFIRM
链接:https://jdbc.postgresql.org/documentation/changelog.html#version_42.2.13
来源:MLIST
来源:MLIST
来源:MLIST
来源:MLIST
来源:MLIST
来源:CONFIRM
链接:https://github.com/pgjdbc/pgjdbc/commit/14b62aca4764d496813f55a43d050b017e01eb65
来源:MLIST
来源:MLIST
来源:www.auscert.org.au
链接:https://www.auscert.org.au/bulletins/ESB-2020.3558/
来源:packetstormsecurity.com
链接:https://packetstormsecurity.com/files/160945/Red-Hat-Security-Advisory-2021-0110-01.html
来源:www.nsfocus.net
链接:http://www.nsfocus.net/vulndb/46887
来源:vigilance.fr
链接:https://vigilance.fr/vulnerability/PostgreSQL-JDBC-external-XML-entity-injection-32936
来源:packetstormsecurity.com
链接:https://packetstormsecurity.com/files/158679/Red-Hat-Security-Advisory-2020-3248-01.html
来源:packetstormsecurity.com
链接:https://packetstormsecurity.com/files/159090/Red-Hat-Security-Advisory-2020-3678-01.html
来源:packetstormsecurity.com
链接:https://packetstormsecurity.com/files/160562/Red-Hat-Security-Advisory-2020-5568-01.html
来源:packetstormsecurity.com
链接:https://packetstormsecurity.com/files/158631/Red-Hat-Security-Advisory-2020-3176-01.html
来源:www.auscert.org.au
链接:https://www.auscert.org.au/bulletins/ESB-2020.4199/
来源:www.auscert.org.au
链接:https://www.auscert.org.au/bulletins/ESB-2020.4464/
来源:www.auscert.org.au
链接:https://www.auscert.org.au/bulletins/ESB-2020.2576/
来源:www.auscert.org.au
链接:https://www.auscert.org.au/bulletins/ESB-2020.3213.2/
来源:www.auscert.org.au
链接:https://www.auscert.org.au/bulletins/ESB-2020.3084/
来源:packetstormsecurity.com
链接:https://packetstormsecurity.com/files/158483/Red-Hat-Security-Advisory-2020-3005-01.html
来源:www.auscert.org.au
链接:https://www.auscert.org.au/bulletins/ESB-2020.2467/
来源:packetstormsecurity.com
链接:https://packetstormsecurity.com/files/158654/Red-Hat-Security-Advisory-2020-3209-01.html
来源:www.auscert.org.au
链接:https://www.auscert.org.au/bulletins/ESB-2021.0130/
来源:www.auscert.org.au
链接:https://www.auscert.org.au/bulletins/ESB-2020.2648/
来源:www.auscert.org.au
链接:https://www.auscert.org.au/bulletins/ESB-2020.4416/
来源:nvd.nist.gov
链接:https://nvd.nist.gov/vuln/detail/CVE-2020-13692
来源:www.auscert.org.au
链接:https://www.auscert.org.au/bulletins/ESB-2020.2618/
来源:www.ibm.com
来源:www.auscert.org.au
链接:https://www.auscert.org.au/bulletins/ESB-2020.3213/
受影响实体
暂无
信息来源
http://www.cnnvd.org.cn/web/xxk/ldxqById.tag?CNNVD=CNNVD-202006-453

评论