Vulnerability Details : CVE-2012-3489
The xml_parse function in the libxml2 support in the core server component in PostgreSQL 8.3 before 8.3.20, 8.4 before 8.4.13, 9.0 before 9.0.9, and 9.1 before 9.1.5 allows remote authenticated users to determine the existence of arbitrary files or URLs, and possibly obtain file or URL content that triggers a parsing error, via an XML value that refers to (1) a DTD or (2) an entity, related to an XML External Entity (aka XXE) issue.
Vulnerability category: XML external entity (XXE) injection
Threat overview for CVE-2012-3489
Top countries where our scanners detected CVE-2012-3489
Top open port discovered on systems with this issue
5432
IPs affected by CVE-2012-3489 33,214
Threat actors abusing to this issue?
Yes
Find out if you* are
affected by CVE-2012-3489!
*Directly or indirectly through your vendors, service providers and 3rd parties.
Powered by
attack surface intelligence
from SecurityScorecard.
Exploit prediction scoring system (EPSS) score for CVE-2012-3489
Probability of exploitation activity in the next 30 days: 0.22%
Percentile, the proportion of vulnerabilities that are scored at or less: ~ 60 % EPSS Score History EPSS FAQ
CVSS scores for CVE-2012-3489
Base Score | Base Severity | CVSS Vector | Exploitability Score | Impact Score | Score Source |
---|---|---|---|---|---|
4.0
|
MEDIUM | AV:N/AC:L/Au:S/C:P/I:N/A:N |
8.0
|
2.9
|
NIST |
6.5
|
MEDIUM | CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N |
2.8
|
3.6
|
NIST |
CWE ids for CVE-2012-3489
-
The product receives input or data, but it does not validate or incorrectly validates that the input has the properties that are required to process the data safely and correctly.Assigned by: nvd@nist.gov (Primary)
-
The product processes an XML document that can contain XML entities with URIs that resolve to documents outside of the intended sphere of control, causing the product to embed incorrect documents into its output.Assigned by: nvd@nist.gov (Primary)
References for CVE-2012-3489
-
http://www.postgresql.org/support/security/
PostgreSQL: Security InformationRelease Notes;Vendor Advisory
-
http://www.postgresql.org/docs/8.3/static/release-8-3-20.html
PostgreSQL: Documentation: 8.3: Release 8.3.20Release Notes
-
http://lists.apple.com/archives/security-announce/2013/Mar/msg00002.html
Apple - Lists.apple.comMailing List
-
http://rhn.redhat.com/errata/RHSA-2012-1263.html
RHSA-2012:1263 - Security Advisory - Red Hat Customer PortalThird Party Advisory
-
http://secunia.com/advisories/50946
Sign inBroken Link
-
http://www.postgresql.org/docs/9.0/static/release-9-0-9.html
PostgreSQL: Documentation: 9.0: Release 9.0.9Release Notes
-
http://www.postgresql.org/docs/8.4/static/release-8-4-13.html
PostgreSQL: Documentation: 8.4: Release 8.4.13Release Notes
-
http://www.postgresql.org/docs/9.1/static/release-9-1-5.html
PostgreSQL: Documentation: 9.1: Release 9.1.5Release Notes
-
http://secunia.com/advisories/50718
Sign inBroken Link
-
http://www.debian.org/security/2012/dsa-2534
Debian -- Security Information -- DSA-2534-1 postgresql-8.4Mailing List
-
http://lists.opensuse.org/opensuse-updates/2012-10/msg00024.html
openSUSE-SU-2012:1299-1: moderate: postgresql: security and bugfix upgraMailing List
-
http://www.securityfocus.com/bid/55074
PostgreSQL 'xml_parse()' Function Arbitrary File Access VulnerabilityBroken Link;Third Party Advisory;VDB Entry
-
http://www.postgresql.org/about/news/1407/
PostgreSQL: Security Update 2012-08-17 releasedVendor Advisory
-
http://lists.opensuse.org/opensuse-updates/2012-09/msg00102.html
openSUSE-SU-2012:1251-1: moderate: postgresql, postgresql-libsMailing List
-
http://www.mandriva.com/security/advisories?name=MDVSA-2012:139
mandriva.comBroken Link
-
http://secunia.com/advisories/50635
Sign inBroken Link
-
https://blogs.oracle.com/sunsecurity/entry/multiple_vulnerabilities_in_postgresql2
Multiple vulnerabilities in PostgreSQL | Oracle Third Party Vulnerability Resolution BlogThird Party Advisory
-
http://secunia.com/advisories/50859
Sign inBroken Link
-
http://www.ubuntu.com/usn/USN-1542-1
USN-1542-1: PostgreSQL vulnerabilities | Ubuntu security noticesThird Party Advisory
-
https://bugzilla.redhat.com/show_bug.cgi?id=849173
849173 – (CVE-2012-3489) CVE-2012-3489 postgresql: File disclosure through XXE in xmlparse by DTD validationIssue Tracking;Patch;Release Notes
-
http://lists.opensuse.org/opensuse-updates/2012-10/msg00013.html
openSUSE-SU-2012:1288-1: moderate: postgresql, postgresql-libsMailing List
Products affected by CVE-2012-3489
- cpe:2.3:o:debian:debian_linux:6.0:*:*:*:*:*:*:*
- cpe:2.3:o:redhat:enterprise_linux_desktop:5.0:*:*:*:*:*:*:*
- cpe:2.3:o:redhat:enterprise_linux_desktop:6.0:*:*:*:*:*:*:*
- cpe:2.3:o:redhat:enterprise_linux_eus:6.3:*:*:*:*:*:*:*
- cpe:2.3:o:redhat:enterprise_linux_server:5.0:*:*:*:*:*:*:*
- cpe:2.3:o:redhat:enterprise_linux_server:6.0:*:*:*:*:*:*:*
- cpe:2.3:o:redhat:enterprise_linux_workstation:5.0:*:*:*:*:*:*:*
- cpe:2.3:o:redhat:enterprise_linux_workstation:6.0:*:*:*:*:*:*:*
- cpe:2.3:o:apple:mac_os_x_server:*:*:*:*:*:*:*:*
- cpe:2.3:o:apple:mac_os_x_server:10.6.8:*:*:*:*:*:*:*
- cpe:2.3:a:postgresql:postgresql:*:*:*:*:*:*:*:*
- cpe:2.3:a:postgresql:postgresql:*:*:*:*:*:*:*:*
- cpe:2.3:a:postgresql:postgresql:*:*:*:*:*:*:*:*
- cpe:2.3:a:postgresql:postgresql:*:*:*:*:*:*:*:*
- cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:-:*:*:*
- cpe:2.3:o:canonical:ubuntu_linux:8.04:*:*:*:-:*:*:*
- cpe:2.3:o:canonical:ubuntu_linux:10.04:*:*:*:-:*:*:*
- cpe:2.3:o:canonical:ubuntu_linux:11.04:*:*:*:*:*:*:*
- cpe:2.3:o:canonical:ubuntu_linux:11.10:*:*:*:*:*:*:*
- cpe:2.3:o:opensuse:opensuse:11.4:*:*:*:*:*:*:*
- cpe:2.3:o:opensuse:opensuse:12.2:*:*:*:*:*:*:*
- cpe:2.3:o:opensuse:opensuse:12.1:*:*:*:*:*:*:*