Odyssey passes to client unencrypted bytes from man-in-the-middle When Odyssey storage is configured to use the PostgreSQL server using 'trust' authentication with a 'clientcert' requirement or to use 'cert' authentication, a man-in-the-middle attacker can inject false responses to the client's first few queries. Despite the use of SSL certificate verification and encryption, Odyssey will pass these results to client as if they originated from valid server. This is similar to CVE-2021-23222 for PostgreSQL.
References
Link | Resource |
---|---|
https://github.com/yandex/odyssey/issues/377%2C | |
https://www.postgresql.org/support/security/CVE-2021-23222/ | Not Applicable Vendor Advisory |
https://github.com/yandex/odyssey/issues/377%2C | |
https://www.postgresql.org/support/security/CVE-2021-23222/ | Not Applicable Vendor Advisory |
Configurations
Configuration 1 (hide)
|
History
21 Nov 2024, 06:29
Type | Values Removed | Values Added |
---|---|---|
References | () https://github.com/yandex/odyssey/issues/377%2C - | |
References | () https://www.postgresql.org/support/security/CVE-2021-23222/ - Not Applicable, Vendor Advisory |
07 Nov 2023, 03:39
Type | Values Removed | Values Added |
---|---|---|
References |
|
|
Information
Published : 2022-08-25 18:15
Updated : 2024-11-21 06:29
NVD link : CVE-2021-43767
Mitre link : CVE-2021-43767
CVE.ORG link : CVE-2021-43767
JSON object : View
Products Affected
postgresql
- postgresql