Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

debian логотип

CVE-2020-25695

Опубликовано: 16 нояб. 2020
Источник: debian
EPSS Средний

Описание

A flaw was found in PostgreSQL versions before 13.1, before 12.5, before 11.10, before 10.15, before 9.6.20 and before 9.5.24. An attacker having permission to create non-temporary objects in at least one schema can execute arbitrary SQL functions under the identity of a superuser. The highest threat from this vulnerability is to data confidentiality and integrity as well as system availability.

Пакеты

ПакетСтатусВерсия исправленияРелизТип
postgresql-13fixed13.1-1package
postgresql-12removedpackage
postgresql-11removedpackage
postgresql-11fixed11.10-0+deb10u1busterpackage
postgresql-9.6removedpackage

Примечания

  • https://www.postgresql.org/about/news/postgresql-131-125-1110-1015-9620-and-9524-released-2111/

  • https://git.postgresql.org/gitweb/?p=postgresql.git;a=commitdiff;h=aefc625dedae52073e7d279feb43f6255f992ea7 (REL9_5_STABLE)

EPSS

Процентиль: 96%
0.23807
Средний

Связанные уязвимости

CVSS3: 8.8
ubuntu
больше 4 лет назад

A flaw was found in PostgreSQL versions before 13.1, before 12.5, before 11.10, before 10.15, before 9.6.20 and before 9.5.24. An attacker having permission to create non-temporary objects in at least one schema can execute arbitrary SQL functions under the identity of a superuser. The highest threat from this vulnerability is to data confidentiality and integrity as well as system availability.

CVSS3: 8.8
redhat
больше 4 лет назад

A flaw was found in PostgreSQL versions before 13.1, before 12.5, before 11.10, before 10.15, before 9.6.20 and before 9.5.24. An attacker having permission to create non-temporary objects in at least one schema can execute arbitrary SQL functions under the identity of a superuser. The highest threat from this vulnerability is to data confidentiality and integrity as well as system availability.

CVSS3: 8.8
nvd
больше 4 лет назад

A flaw was found in PostgreSQL versions before 13.1, before 12.5, before 11.10, before 10.15, before 9.6.20 and before 9.5.24. An attacker having permission to create non-temporary objects in at least one schema can execute arbitrary SQL functions under the identity of a superuser. The highest threat from this vulnerability is to data confidentiality and integrity as well as system availability.

CVSS3: 8.8
msrc
больше 4 лет назад

Описание отсутствует

CVSS3: 8.8
github
больше 3 лет назад

SQL Injection

EPSS

Процентиль: 96%
0.23807
Средний