vulnerability

FreeBSD: VID-2ccd71bd-426b-11ec-87db-6cc21735f730 (CVE-2021-23222): PostgreSQL -- Possible man-in-the-middle attacks

Severity
4
CVSS
(AV:N/AC:M/Au:N/C:P/I:N/A:N)
Published
Nov 10, 2021
Added
Nov 4, 2022
Modified
Dec 10, 2025

Description

The PostgreSQL Project reports: CVE-2021-23214: A man-in-the-middle with the ability to inject data into the TCP connection could stuff some cleartext data into the start of a supposedly encryption-protected database session. This could be abused to send faked SQL commands to the server, although that would only work if the server did not demand any authentication data. (However, a server relying on SSL certificate authentication might well not do so.) CVE-2021-23222: A man-in-the-middle with the ability to inject data into the TCP connection could stuff some cleartext data into the start of a supposedly encryption-protected database session. This could probably be abused to inject faked responses to the client's first few queries, although other details of libpq's behavior make that harder than it sounds. A different line of attack is to exfiltrate the client's password, or other sensitive data that might be sent early in the session. That has been shown to be possible with a server vulnerable to CVE-2021-23214.

Solutions

freebsd-upgrade-package-postgresql14-serverfreebsd-upgrade-package-postgresql13-serverfreebsd-upgrade-package-postgresql12-serverfreebsd-upgrade-package-postgresql11-serverfreebsd-upgrade-package-postgresql10-serverfreebsd-upgrade-package-postgresql96-server
Title
NEW

Explore Exposure Command

Confidently identify and prioritize exposures from endpoint to cloud with full attack surface visibility and threat-aware risk context.