CVE-2007-3278
dblink allows proxying of database connections via 127.0.0.1
Severity Score
6.9
*CVSS v2
Exploit Likelihood
*EPSS
Affected Versions
*CPE
Public Exploits
0
*Multiple Sources
Exploited in Wild
-
*KEV
Decision
-
*SSVC
Descriptions
PostgreSQL 8.1 and probably later versions, when local trust authentication is enabled and the Database Link library (dblink) is installed, allows remote attackers to access arbitrary accounts and execute arbitrary SQL queries via a dblink host parameter that proxies the connection from 127.0.0.1.
PostgreSQL 8.1 y probablemente versiones posteriores, cuando la autenticación de confianza local está habilitada y la librería de enlace a base de datos (Database Link Library (dblink) está instalada, permite a atacantes remotos acceder a cuentas de su elección y ejecutar peticiones SQL mediante un parámetro host de dblink que hace de proxy de la conexión desde 127.0.0.1.
*Credits:
N/A
CVSS Scores
Attack Vector
Attack Complexity
Authentication
Confidentiality
Integrity
Availability
* Common Vulnerability Scoring System
SSVC
- Decision:-
Exploitation
Automatable
Tech. Impact
* Organization's Worst-case Scenario
Timeline
- 2007-06-19 CVE Reserved
- 2007-06-19 CVE Published
- 2024-08-07 CVE Updated
- 2024-11-11 EPSS Updated
- ---------- Exploited in Wild
- ---------- KEV Due Date
- ---------- First Exploit
CWE
- CWE-264: Permissions, Privileges, and Access Controls
CAPEC
References (29)
URL | Tag | Source |
---|---|---|
http://osvdb.org/40899 | Broken Link | |
http://secunia.com/advisories/28376 | Broken Link | |
http://secunia.com/advisories/28437 | Broken Link | |
http://secunia.com/advisories/28438 | Broken Link | |
http://secunia.com/advisories/28445 | Broken Link | |
http://secunia.com/advisories/28454 | Broken Link | |
http://secunia.com/advisories/28477 | Broken Link | |
http://secunia.com/advisories/28479 | Broken Link | |
http://secunia.com/advisories/28679 | Broken Link | |
http://secunia.com/advisories/29638 | Broken Link | |
http://www.leidecker.info/pgshell/Having_Fun_With_PostgreSQL.txt | Third Party Advisory | |
http://www.portcullis.co.uk/uplds/whitepapers/Having_Fun_With_PostgreSQL.pdf | Third Party Advisory | |
http://www.securityfocus.com/archive/1/471541/100/0/threaded | Mailing List | |
http://www.securityfocus.com/archive/1/471644/100/0/threaded | Mailing List | |
https://exchange.xforce.ibmcloud.com/vulnerabilities/35142 | Third Party Advisory | |
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10334 | Signature |
URL | Date | SRC |
---|
URL | Date | SRC |
---|
Affected Vendors, Products, and Versions
Vendor | Product | Version | Other | Status | ||||||
---|---|---|---|---|---|---|---|---|---|---|
Vendor | Product | Version | Other | Status | <-- --> | Vendor | Product | Version | Other | Status |
Postgresql Search vendor "Postgresql" | Postgresql Search vendor "Postgresql" for product "Postgresql" | >= 7.3 < 7.3.21 Search vendor "Postgresql" for product "Postgresql" and version " >= 7.3 < 7.3.21" | - |
Affected
| ||||||
Postgresql Search vendor "Postgresql" | Postgresql Search vendor "Postgresql" for product "Postgresql" | >= 7.4 < 7.4.19 Search vendor "Postgresql" for product "Postgresql" and version " >= 7.4 < 7.4.19" | - |
Affected
| ||||||
Postgresql Search vendor "Postgresql" | Postgresql Search vendor "Postgresql" for product "Postgresql" | >= 8.0 < 8.0.15 Search vendor "Postgresql" for product "Postgresql" and version " >= 8.0 < 8.0.15" | - |
Affected
| ||||||
Postgresql Search vendor "Postgresql" | Postgresql Search vendor "Postgresql" for product "Postgresql" | >= 8.1 < 8.1.11 Search vendor "Postgresql" for product "Postgresql" and version " >= 8.1 < 8.1.11" | - |
Affected
| ||||||
Postgresql Search vendor "Postgresql" | Postgresql Search vendor "Postgresql" for product "Postgresql" | >= 8.2 < 8.2.6 Search vendor "Postgresql" for product "Postgresql" and version " >= 8.2 < 8.2.6" | - |
Affected
| ||||||
Debian Search vendor "Debian" | Debian Linux Search vendor "Debian" for product "Debian Linux" | 3.1 Search vendor "Debian" for product "Debian Linux" and version "3.1" | - |
Affected
| ||||||
Debian Search vendor "Debian" | Debian Linux Search vendor "Debian" for product "Debian Linux" | 4.0 Search vendor "Debian" for product "Debian Linux" and version "4.0" | - |
Affected
|