CVE-2025-49146 – org.postgresql:postgresql
Package
Manager: maven
Name: org.postgresql:postgresql
Vulnerable Version: >=42.7.4 <42.7.7
Severity
Level: High
CVSS v3.1: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:L/A:N
CVSS v4.0: CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:L/VA:N/SC:N/SI:N/SA:N
EPSS: 0.00026 pctl0.05528
Details
pgjdbc Client Allows Fallback to Insecure Authentication Despite channelBinding=require Configuration ### Impact When the PostgreSQL JDBC driver is configured with channel binding set to `required` (default value is `prefer`), the driver would incorrectly allow connections to proceed with authentication methods that do not support channel binding (such as password, MD5, GSS, or SSPI authentication). This could allow a man-in-the-middle attacker to intercept connections that users believed were protected by channel binding requirements. ### Patches TBD ### Workarounds Configure `sslMode=verify-full` to prevent MITM attacks. ### References * https://www.postgresql.org/docs/current/sasl-authentication.html#SASL-SCRAM-SHA-256 * https://datatracker.ietf.org/doc/html/rfc7677 * https://datatracker.ietf.org/doc/html/rfc5802
Metadata
Created: 2025-06-11T14:44:04Z
Modified: 2025-06-11T16:17:03Z
Source: https://github.com/github/advisory-database/blob/main/advisories/github-reviewed/2025/06/GHSA-hq9p-pm7w-8p54/GHSA-hq9p-pm7w-8p54.json
CWE IDs: ["CWE-287"]
Alternative ID: GHSA-hq9p-pm7w-8p54
Finding: F039
Auto approve: 1