A flaw was found in PostgreSQL versions before 13.1, before 12.5, before 11.10, before 10.15, before 9.6.20 and before 9.5.24. If a client application that creates additional database connections only reuses the basic connection parameters while dropping security-relevant parameters, an opportunity for a man-in-the-middle attack, or the ability to observe clear-text transmissions, could exist. The highest threat from this vulnerability is to data confidentiality and integrity as well as system availability.
"https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2020-25694.json"
[
{
"events": [
{
"introduced": "0"
},
{
"fixed": "9.5.24"
}
]
},
{
"events": [
{
"introduced": "9.6.0"
},
{
"fixed": "9.6.20"
}
]
},
{
"events": [
{
"introduced": "10.0"
},
{
"fixed": "10.15"
}
]
},
{
"events": [
{
"introduced": "11.0"
},
{
"fixed": "11.10"
}
]
},
{
"events": [
{
"introduced": "12.0"
},
{
"fixed": "12.5"
}
]
},
{
"events": [
{
"introduced": "13.0"
},
{
"fixed": "13.1"
}
]
},
{
"events": [
{
"introduced": "0"
},
{
"last_affected": "9.0"
}
]
}
]