Vulnerability Name: CVE-2022-1552 (CCN-226521) Assigned: 2022-05-12 Published: 2022-05-12 Updated: 2022-12-08 Summary: A flaw was found in PostgreSQL. There is an issue with incomplete efforts to operate safely when a privileged user is maintaining another user's objects. The Autovacuum, REINDEX, CREATE INDEX, REFRESH MATERIALIZED VIEW, CLUSTER, and pg_amcheck commands activated relevant protections too late or not at all during the process. This flaw allows an attacker with permission to create non-temporary objects in at least one schema to execute arbitrary SQL functions under a superuser identity. CVSS v3 Severity: 8.8 High (CCN CVSS v3.1 Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H )7.7 High (CCN Temporal CVSS v3.1 Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C )Exploitability Metrics: Attack Vector (AV): NetworkAttack Complexity (AC): LowPrivileges Required (PR): LowUser Interaction (UI): NoneScope: Scope (S): UnchangedImpact Metrics: Confidentiality (C): HighIntegrity (I): HighAvailibility (A): High
8.8 High (REDHAT CVSS v3.1 Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H )7.7 High (REDHAT Temporal CVSS v3.1 Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C )Exploitability Metrics: Attack Vector (AV): NetworkAttack Complexity (AC): LowPrivileges Required (PR): LowUser Interaction (UI): NoneScope: Scope (S): UnchangedImpact Metrics: Confidentiality (C): HighIntegrity (I): HighAvailibility (A): High
CVSS v2 Severity: 9.0 High (CCN CVSS v2 Vector: AV:N/AC:L/Au:S/C:C/I:C/A:C )Exploitability Metrics: Access Vector (AV): NetworkAccess Complexity (AC): LowAthentication (Au): Single_InstanceImpact Metrics: Confidentiality (C): CompleteIntegrity (I): CompleteAvailibility (A): Complete
Vulnerability Type: CWE-89 Vulnerability Consequences: Bypass Security References: Source: MITRE Type: CNACVE-2022-1552 Source: secalert@redhat.com Type: Third Party Advisorysecalert@redhat.com Source: CCN Type: Red Hat Bugzilla Bug 2081126(CVE-2022-1552) - CVE-2022-1552 postgresql: Autovacuum, REINDEX, and others omit security restricted operation sandbox Source: secalert@redhat.com Type: Issue Tracking, Patch, Third Party Advisorysecalert@redhat.com Source: XF Type: UNKNOWNpostgresql-cve20221552-sec-bypass(226521) Source: secalert@redhat.com Type: Third Party Advisorysecalert@redhat.com Source: secalert@redhat.com Type: Third Party Advisorysecalert@redhat.com Source: CCN Type: IBM Security Bulletin 6602959 (Sterling Connect:Direct for Microsoft Windows)IBM Sterling Connect:Direct for Microsoft Windows is vulnerable to remote SQL execution due to PostgreSQL (CVE-2022-1552) Source: CCN Type: IBM Security Bulletin 6610084 (Data Risk Manager)IBM Data Risk Manager is affected by multiple vulnerabilities including remote code execution in Apache Log4j 1.x Source: CCN Type: IBM Security Bulletin 6615005 (Sterling Connect:Direct Web Services)IBM Connect:Direct Web Services vulnerable to remote security bypass due to PostgreSQL (CVE-2022-1552) Source: CCN Type: IBM Security Bulletin 6619905 (Spectrum Copy Data Management)Vulnerabilities in Golang Go, PostgreSQL, jQuery, and Google Gson may affect IBM Spectrum Copy Data Management Source: CCN Type: IBM Security Bulletin 6827881 (Security QRadar Network Threat Analytics)IBM Security Network Threat Analytics for IBM QRadar SIEM is vulnerable to using components with known vulnerabilities (CVE-2022-1941, CVE-2022-34749, CVE-2022-1552) Source: CCN Type: IBM Security Bulletin 6828557 (Security Guardium)IBM Security Guardium is affected by a PostgreSQL vulnerability (CVE-2022-1552) Source: CCN Type: IBM Security Bulletin 6831855 (QRadar SIEM)IBM QRadar SIEM is vulnerable to Using Components with Known Vulnerabilities Source: CCN Type: IBM Security Bulletin 6833500 (Elastic Storage System) Vulnerability in PostgreSQL may affect IBM Elastic Storage System Source: CCN Type: IBM Security Bulletin 6848189 (Cloud Pak for Watson AIOps)Multiple Vulnerabilities in CloudPak for Watson AIOPs Source: CCN Type: Mend Vulnerability DatabaseCVE-2022-1552 Source: secalert@redhat.com Type: Vendor Advisorysecalert@redhat.com Source: CCN Type: PostgreSQL Web siteAutovacuum, REINDEX, and others omit security restricted operation sandbox Source: secalert@redhat.com Type: Vendor Advisorysecalert@redhat.com Vulnerable Configuration: Configuration RedHat 1 :cpe:/a:redhat:enterprise_linux:9:*:*:*:*:*:*:* Configuration RedHat 2 :cpe:/a:redhat:enterprise_linux:9::appstream:*:*:*:*:* Configuration RedHat 3 :cpe:/a:redhat:enterprise_linux:9::crb:*:*:*:*:* Configuration RedHat 4 :cpe:/a:redhat:enterprise_linux:8:*:*:*:*:*:*:* Configuration RedHat 5 :cpe:/a:redhat:enterprise_linux:8::appstream:*:*:*:*:* Configuration RedHat 6 :cpe:/o:redhat:enterprise_linux:7:*:*:*:*:*:*:* Configuration RedHat 7 :cpe:/o:redhat:enterprise_linux:7::client:*:*:*:*:* Configuration RedHat 8 :cpe:/o:redhat:enterprise_linux:7::computenode:*:*:*:*:* Configuration RedHat 9 :cpe:/o:redhat:enterprise_linux:7::server:*:*:*:*:* Configuration RedHat 10 :cpe:/o:redhat:enterprise_linux:7::workstation:*:*:*:*:* Configuration CCN 1 :cpe:/a:postgresql:postgresql:10.1:*:*:*:*:*:*:* OR cpe:/a:postgresql:postgresql:10.2:*:*:*:*:*:*:* OR cpe:/a:postgresql:postgresql:10.4:*:*:*:*:*:*:* OR cpe:/a:postgresql:postgresql:10.5:*:*:*:*:*:*:* OR cpe:/a:postgresql:postgresql:11.2:*:*:*:*:*:*:* OR cpe:/a:postgresql:postgresql:10.7:*:*:*:*:*:*:* OR cpe:/a:postgresql:postgresql:10.8:*:*:*:*:*:*:* OR cpe:/a:postgresql:postgresql:11.3:*:*:*:*:*:*:* OR cpe:/a:postgresql:postgresql:10.11:*:*:*:*:*:*:* OR cpe:/a:postgresql:postgresql:11.6:*:*:*:*:*:*:* OR cpe:/a:postgresql:postgresql:12.1:*:*:*:*:*:*:* OR cpe:/a:postgresql:postgresql:12.3:*:*:*:*:*:*:* OR cpe:/a:postgresql:postgresql:11.8:*:*:*:*:*:*:* OR cpe:/a:postgresql:postgresql:10.13:*:*:*:*:*:*:* OR cpe:/a:postgresql:postgresql:12.4:*:*:*:*:*:*:* OR cpe:/a:postgresql:postgresql:11.9:*:*:*:*:*:*:* OR cpe:/a:postgresql:postgresql:10.14:*:*:*:*:*:*:* OR cpe:/a:postgresql:postgresql:10.15:*:*:*:*:*:*:* OR cpe:/a:postgresql:postgresql:11.10:*:*:*:*:*:*:* OR cpe:/a:postgresql:postgresql:12.5:*:*:*:*:*:*:* OR cpe:/a:postgresql:postgresql:13.1:*:*:*:*:*:*:* OR cpe:/a:postgresql:postgresql:10.16:*:*:*:*:*:*:* OR cpe:/a:postgresql:postgresql:11.11:*:*:*:*:*:*:* OR cpe:/a:postgresql:postgresql:12.6:*:*:*:*:*:*:* OR cpe:/a:postgresql:postgresql:13.2:*:*:*:*:*:*:* AND cpe:/a:ibm:sterling_connect:direct:4.8:*:*:*:microsoft_windows:*:*:* OR cpe:/a:ibm:sterling_connect:direct:6.0:*:*:*:microsoft_windows:*:*:* OR cpe:/a:ibm:security_guardium:11.0:*:*:*:*:*:*:* OR cpe:/a:ibm:security_guardium:11.1:*:*:*:*:*:*:* OR cpe:/a:ibm:qradar_security_information_and_event_manager:7.4:-:*:*:*:*:*:* OR cpe:/a:ibm:security_guardium:11.2:*:*:*:*:*:*:* OR cpe:/a:ibm:security_guardium:11.3:*:*:*:*:*:*:* OR cpe:/a:ibm:security_guardium:11.4:*:*:*:*:*:*:* OR cpe:/a:ibm:spectrum_copy_data_management:2.2.0.0:*:*:*:*:*:*:* Denotes that component is vulnerable Oval Definitions BACK
postgresql postgresql 10.1
postgresql postgresql 10.2
postgresql postgresql 10.4
postgresql postgresql 10.5
postgresql postgresql 11.2
postgresql postgresql 10.7
postgresql postgresql 10.8
postgresql postgresql 11.3
postgresql postgresql 10.11
postgresql postgresql 11.6
postgresql postgresql 12.1
postgresql postgresql 12.3
postgresql postgresql 11.8
postgresql postgresql 10.13
postgresql postgresql 12.4
postgresql postgresql 11.9
postgresql postgresql 10.14
postgresql postgresql 10.15
postgresql postgresql 11.10
postgresql postgresql 12.5
postgresql postgresql 13.1
postgresql postgresql 10.16
postgresql postgresql 11.11
postgresql postgresql 12.6
postgresql postgresql 13.2
ibm sterling connect:direct 4.8
ibm sterling connect:direct 6.0
ibm security guardium 11.0
ibm security guardium 11.1
ibm qradar security information and event manager 7.4 -
ibm security guardium 11.2
ibm security guardium 11.3
ibm security guardium 11.4
ibm spectrum copy data management 2.2.0.0