Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

redhat логотип

CVE-2024-10979

Опубликовано: 14 нояб. 2024
Источник: redhat
CVSS3: 8.8

Описание

Incorrect control of environment variables in PostgreSQL PL/Perl allows an unprivileged database user to change sensitive process environment variables (e.g. PATH). That often suffices to enable arbitrary code execution, even if the attacker lacks a database server operating system user. Versions before PostgreSQL 17.1, 16.5, 15.9, 14.14, 13.17, and 12.21 are affected.

A flaw was found in PostgreSQL PL/Perl. This vulnerability allows an unprivileged database user to change sensitive process environment variables (e.g., PATH) via incorrect control of environment variables.

Отчет

This vulnerability has been given a severity rating of important because the ability to modify sensitive process environment variables (ex. PATH) can lead to unauthorized code execution and privilege escalation. Depending on the privileges of the PostgreSQL user, an attacker may be able to gain higher-level access to the underlying server and create functions who modify environment variables and execute arbitrary commands.

Меры по смягчению последствий

Currently the following options exist to help mitigate the impact of this vulnerability:

  1. Restrict Permissions: the creation of PL/Python and PL/Perl functions should be limited to trusted users only.
  2. Environment Variable Sanitization: ensure that environment variables are properly sanitized and any modifications are restricted.
  3. Upgrade PostgreSQL: if a fix is released by the PostgreSQL Global Development Group, update to the latest version.
  4. Audit Database Functions: perform regular audits on user-created functions to detect and prevent potential exploitation.

Затронутые пакеты

ПлатформаПакетСостояниеРекомендацияРелиз
Red Hat Enterprise Linux 6postgresqlOut of support scope
Red Hat Enterprise Linux 7 Extended Lifecycle SupportpostgresqlFixedRHSA-2024:1088209.12.2024
Red Hat Enterprise Linux 8postgresqlFixedRHSA-2024:1078504.12.2024
Red Hat Enterprise Linux 8postgresqlFixedRHSA-2024:1083005.12.2024
Red Hat Enterprise Linux 8postgresqlFixedRHSA-2024:1083105.12.2024
Red Hat Enterprise Linux 8postgresqlFixedRHSA-2024:1083205.12.2024
Red Hat Enterprise Linux 8.2 Advanced Update SupportpostgresqlFixedRHSA-2024:1073903.12.2024
Red Hat Enterprise Linux 8.4 Advanced Mission Critical Update SupportpostgresqlFixedRHSA-2024:1078904.12.2024
Red Hat Enterprise Linux 8.4 Advanced Mission Critical Update SupportpostgresqlFixedRHSA-2024:1084605.12.2024
Red Hat Enterprise Linux 8.4 Telecommunications Update ServicepostgresqlFixedRHSA-2024:1078904.12.2024

Показывать по

Дополнительная информация

Статус:

Important
Дефект:
CWE-15
https://bugzilla.redhat.com/show_bug.cgi?id=2326253postgresql: PostgreSQL PL/Perl environment variable changes execute arbitrary code

8.8 High

CVSS3

Связанные уязвимости

CVSS3: 8.8
ubuntu
10 месяцев назад

Incorrect control of environment variables in PostgreSQL PL/Perl allows an unprivileged database user to change sensitive process environment variables (e.g. PATH). That often suffices to enable arbitrary code execution, even if the attacker lacks a database server operating system user. Versions before PostgreSQL 17.1, 16.5, 15.9, 14.14, 13.17, and 12.21 are affected.

CVSS3: 8.8
nvd
10 месяцев назад

Incorrect control of environment variables in PostgreSQL PL/Perl allows an unprivileged database user to change sensitive process environment variables (e.g. PATH). That often suffices to enable arbitrary code execution, even if the attacker lacks a database server operating system user. Versions before PostgreSQL 17.1, 16.5, 15.9, 14.14, 13.17, and 12.21 are affected.

CVSS3: 8.8
msrc
10 месяцев назад

Описание отсутствует

CVSS3: 8.8
debian
10 месяцев назад

Incorrect control of environment variables in PostgreSQL PL/Perl allow ...

CVSS3: 8.8
github
10 месяцев назад

Incorrect control of environment variables in PostgreSQL PL/Perl allows an unprivileged database user to change sensitive process environment variables (e.g. PATH). That often suffices to enable arbitrary code execution, even if the attacker lacks a database server operating system user. Versions before PostgreSQL 17.1, 16.5, 15.9, 14.14, 13.17, and 12.21 are affected.

8.8 High

CVSS3