Уязвимость выполнения произвольных SQL-команд в PostgreSQL через некорректную обработку "search_path" при логической репликации
Описание
Обнаружено, что в PostgreSQL некорректно обрабатывается параметр search_path
во время логической репликации. Аутентифицированный злоумышленник способен использовать эту уязвимость для выполнения произвольных SQL-команд в контексте пользователя, который используется для репликации. Эта атака схожа с уязвимостью CVE-2018-1058.
Затронутые версии ПО
- PostgreSQL версий до 12.4
- PostgreSQL версий до 11.9
- PostgreSQL версий до 10.14
Тип уязвимости
Выполнение произвольных SQL-команд
Ссылки
- Broken LinkMailing ListThird Party Advisory
- Mailing ListThird Party Advisory
- Mailing ListThird Party Advisory
- Mailing ListThird Party Advisory
- Mailing ListThird Party Advisory
- Issue TrackingThird Party Advisory
- Third Party Advisory
- Third Party Advisory
- Third Party Advisory
- Broken LinkMailing ListThird Party Advisory
- Mailing ListThird Party Advisory
- Mailing ListThird Party Advisory
- Mailing ListThird Party Advisory
- Mailing ListThird Party Advisory
- Issue TrackingThird Party Advisory
- Third Party Advisory
- Third Party Advisory
- Third Party Advisory
Уязвимые конфигурации
Одно из
Одно из
EPSS
7.1 High
CVSS3
4.6 Medium
CVSS2
Дефекты
Связанные уязвимости
It was found that PostgreSQL versions before 12.4, before 11.9 and before 10.14 did not properly sanitize the search_path during logical replication. An authenticated attacker could use this flaw in an attack similar to CVE-2018-1058, in order to execute arbitrary SQL command in the context of the user used for replication.
It was found that PostgreSQL versions before 12.4, before 11.9 and before 10.14 did not properly sanitize the search_path during logical replication. An authenticated attacker could use this flaw in an attack similar to CVE-2018-1058, in order to execute arbitrary SQL command in the context of the user used for replication.
It was found that PostgreSQL versions before 12.4, before 11.9 and bef ...
It was found that PostgreSQL versions before 12.4, before 11.9 and before 10.14 did not properly sanitize the search_path during logical replication. An authenticated attacker could use this flaw in an attack similar to CVE-2018-1058, in order to execute arbitrary SQL command in the context of the user used for replication.
EPSS
7.1 High
CVSS3
4.6 Medium
CVSS2