Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

redhat логотип

CVE-2024-10979

Опубликовано: 14 нояб. 2024
Источник: redhat
CVSS3: 8.8
EPSS Низкий

Описание

Incorrect control of environment variables in PostgreSQL PL/Perl allows an unprivileged database user to change sensitive process environment variables (e.g. PATH). That often suffices to enable arbitrary code execution, even if the attacker lacks a database server operating system user. Versions before PostgreSQL 17.1, 16.5, 15.9, 14.14, 13.17, and 12.21 are affected.

A flaw was found in PostgreSQL PL/Perl. This vulnerability allows an unprivileged database user to change sensitive process environment variables (e.g., PATH) via incorrect control of environment variables.

Отчет

This vulnerability has been given a severity rating of important because the ability to modify sensitive process environment variables (ex. PATH) can lead to unauthorized code execution and privilege escalation. Depending on the privileges of the PostgreSQL user, an attacker may be able to gain higher-level access to the underlying server and create functions who modify environment variables and execute arbitrary commands.

Меры по смягчению последствий

Currently the following options exist to help mitigate the impact of this vulnerability:

  1. Restrict Permissions: the creation of PL/Python and PL/Perl functions should be limited to trusted users only.
  2. Environment Variable Sanitization: ensure that environment variables are properly sanitized and any modifications are restricted.
  3. Upgrade PostgreSQL: if a fix is released by the PostgreSQL Global Development Group, update to the latest version.
  4. Audit Database Functions: perform regular audits on user-created functions to detect and prevent potential exploitation.

Затронутые пакеты

ПлатформаПакетСостояниеРекомендацияРелиз
Red Hat Enterprise Linux 6postgresqlOut of support scope
Red Hat Enterprise Linux 7 Extended Lifecycle SupportpostgresqlFixedRHSA-2024:1088209.12.2024
Red Hat Enterprise Linux 8postgresqlFixedRHSA-2024:1078504.12.2024
Red Hat Enterprise Linux 8postgresqlFixedRHSA-2024:1083005.12.2024
Red Hat Enterprise Linux 8postgresqlFixedRHSA-2024:1083105.12.2024
Red Hat Enterprise Linux 8postgresqlFixedRHSA-2024:1083205.12.2024
Red Hat Enterprise Linux 8.2 Advanced Update SupportpostgresqlFixedRHSA-2024:1073903.12.2024
Red Hat Enterprise Linux 8.4 Advanced Mission Critical Update SupportpostgresqlFixedRHSA-2024:1078904.12.2024
Red Hat Enterprise Linux 8.4 Advanced Mission Critical Update SupportpostgresqlFixedRHSA-2024:1084605.12.2024
Red Hat Enterprise Linux 8.4 Telecommunications Update ServicepostgresqlFixedRHSA-2024:1078904.12.2024

Показывать по

Дополнительная информация

Статус:

Important
Дефект:
CWE-15
https://bugzilla.redhat.com/show_bug.cgi?id=2326253postgresql: PostgreSQL PL/Perl environment variable changes execute arbitrary code

EPSS

Процентиль: 77%
0.01139
Низкий

8.8 High

CVSS3

Связанные уязвимости

CVSS3: 8.8
ubuntu
7 месяцев назад

Incorrect control of environment variables in PostgreSQL PL/Perl allows an unprivileged database user to change sensitive process environment variables (e.g. PATH). That often suffices to enable arbitrary code execution, even if the attacker lacks a database server operating system user. Versions before PostgreSQL 17.1, 16.5, 15.9, 14.14, 13.17, and 12.21 are affected.

CVSS3: 8.8
nvd
7 месяцев назад

Incorrect control of environment variables in PostgreSQL PL/Perl allows an unprivileged database user to change sensitive process environment variables (e.g. PATH). That often suffices to enable arbitrary code execution, even if the attacker lacks a database server operating system user. Versions before PostgreSQL 17.1, 16.5, 15.9, 14.14, 13.17, and 12.21 are affected.

CVSS3: 8.8
msrc
7 месяцев назад

Описание отсутствует

CVSS3: 8.8
debian
7 месяцев назад

Incorrect control of environment variables in PostgreSQL PL/Perl allow ...

CVSS3: 8.8
github
7 месяцев назад

Incorrect control of environment variables in PostgreSQL PL/Perl allows an unprivileged database user to change sensitive process environment variables (e.g. PATH). That often suffices to enable arbitrary code execution, even if the attacker lacks a database server operating system user. Versions before PostgreSQL 17.1, 16.5, 15.9, 14.14, 13.17, and 12.21 are affected.

EPSS

Процентиль: 77%
0.01139
Низкий

8.8 High

CVSS3