The bitnami/pgpool Docker image, and the bitnami/postgres-ha k8s chart, under default configurations, comes with an 'repmgr' user that allows unauthenticated access to the database inside the cluster.
Impact
The PGPOOL_SR_CHECK_USER is the user that Pgpool itself uses to perform streaming replication checks against nodes, and should not be at trust level. This allows to log into a PostgreSQL database using the repgmr user without authentication. If Pgpool is exposed externally, a potential attacker could use this user to get access to the service. This is also present within the bitnami/postgres-ha Kubernetes Helm chart.
The affected versions are Bitnami Pgpool II component versions previous than 4.6.0-1 (included into the container image
4.6.0-debian-12-r8) and versions of PostgreSQL HA Helm previous than 16.0.0.
Mitigation
The recommended action is to upgrade Pgpool II to use 4.6.0-1 (container image 4.6.0-debian-12-r8) or a newer version.
In the case of the Helm chart, upgrade to 16.0.0 or a newer version.
   
 
The
bitnami/pgpoolDocker image, and thebitnami/postgres-hak8s chart, under default configurations, comes with an 'repmgr' user that allows unauthenticated access to the database inside the cluster.Impact
The
PGPOOL_SR_CHECK_USERis the user that Pgpool itself uses to perform streaming replication checks against nodes, and should not be attrustlevel. This allows to log into a PostgreSQL database using therepgmruser without authentication. If Pgpool is exposed externally, a potential attacker could use this user to get access to the service. This is also present within thebitnami/postgres-haKubernetes Helm chart.The affected versions are Bitnami Pgpool II component versions previous than 4.6.0-1 (included into the container image
4.6.0-debian-12-r8) and versions of PostgreSQL HA Helm previous than 16.0.0.
Mitigation
The recommended action is to upgrade Pgpool II to use 4.6.0-1 (container image 4.6.0-debian-12-r8) or a newer version.
In the case of the Helm chart, upgrade to 16.0.0 or a newer version.