Описание
IN THE EXTENSION SCRIPT, a SQL Injection vulnerability was found in PostgreSQL if it uses @extowner@, @extschema@, or @extschema:...@ inside a quoting construct (dollar quoting, '', or ""). If an administrator has installed files of a vulnerable, trusted, non-bundled extension, an attacker with database-level CREATE privilege can execute arbitrary code as the bootstrap superuser.
Отчет
Bundled extensions are not vulnerable. Also, PostgreSQL will block this attack in the core server, so there's no need to modify individual extensions.
Затронутые пакеты
Платформа | Пакет | Состояние | Рекомендация | Релиз |
---|---|---|---|---|
Red Hat Enterprise Linux 6 | postgresql | Out of support scope | ||
Red Hat Enterprise Linux 7 | postgresql | Out of support scope | ||
Red Hat Enterprise Linux 8 | postgresql:10/postgresql | Not affected | ||
Red Hat Software Collections | rh-postgresql10-postgresql | Will not fix | ||
Red Hat Advanced Cluster Security 4.2 | advanced-cluster-security/rhacs-central-db-rhel8 | Fixed | RHSA-2024:0337 | 22.01.2024 |
Red Hat Advanced Cluster Security 4.2 | advanced-cluster-security/rhacs-main-rhel8 | Fixed | RHSA-2024:0337 | 22.01.2024 |
Red Hat Advanced Cluster Security 4.2 | advanced-cluster-security/rhacs-operator-bundle | Fixed | RHSA-2024:0337 | 22.01.2024 |
Red Hat Advanced Cluster Security 4.2 | advanced-cluster-security/rhacs-scanner-db-rhel8 | Fixed | RHSA-2024:0337 | 22.01.2024 |
Red Hat Advanced Cluster Security 4.2 | advanced-cluster-security/rhacs-scanner-db-slim-rhel8 | Fixed | RHSA-2024:0337 | 22.01.2024 |
Red Hat Enterprise Linux 8 | postgresql | Fixed | RHSA-2023:7581 | 29.11.2023 |
Показывать по
Дополнительная информация
Статус:
EPSS
7.5 High
CVSS3
Связанные уязвимости
IN THE EXTENSION SCRIPT, a SQL Injection vulnerability was found in PostgreSQL if it uses @extowner@, @extschema@, or @extschema:...@ inside a quoting construct (dollar quoting, '', or ""). If an administrator has installed files of a vulnerable, trusted, non-bundled extension, an attacker with database-level CREATE privilege can execute arbitrary code as the bootstrap superuser.
IN THE EXTENSION SCRIPT, a SQL Injection vulnerability was found in PostgreSQL if it uses @extowner@, @extschema@, or @extschema:...@ inside a quoting construct (dollar quoting, '', or ""). If an administrator has installed files of a vulnerable, trusted, non-bundled extension, an attacker with database-level CREATE privilege can execute arbitrary code as the bootstrap superuser.
IN THE EXTENSION SCRIPT, a SQL Injection vulnerability was found in Po ...
EPSS
7.5 High
CVSS3