
Cloud Vulnerability DB
A community-led vulnerabilities database
A vulnerability has been discovered in pghoard, a PostgreSQL backup daemon and restore tooling that stores backup data in cloud object stores. The vulnerability (CVE-2024-56142) was disclosed on December 17, 2024, and affects versions 2.2.2a and earlier. The issue allows an attacker to acquire disk access with privileges equivalent to those of pghoard, enabling unintended path traversal (GitHub Advisory).
The vulnerability is classified as a path traversal issue (CWE-22) with a CVSS v4.0 base score of 4.8 (MEDIUM). The attack vector is local (AV:L), with low attack complexity (AC:L), requiring low privileges (PR:L) and no user interaction (UI:N). The vulnerability primarily impacts confidentiality with a low severity rating (VC:L), while having no impact on integrity (VI:N) or availability (VA:N) (GitHub Advisory, NVD).
The vulnerability could allow an attacker to access sensitive information through path traversal, with the extent of access depending on the permissions and privileges assigned to pghoard. The impact is primarily limited to confidentiality breaches, with no direct effect on system integrity or availability (GitHub Advisory).
The vulnerability has been addressed in releases after version 2.2.2a. Users are strongly advised to upgrade to the latest version as there are no known workarounds for this vulnerability (NVD).
Source: This report was generated using AI
Free Vulnerability Assessment
Evaluate your cloud security practices across 9 security domains to benchmark your risk level and identify gaps in your defenses.
Get a personalized demo
"Best User Experience I have ever seen, provides full visibility to cloud workloads."
"Wiz provides a single pane of glass to see what is going on in our cloud environments."
"We know that if Wiz identifies something as critical, it actually is."