Описание
It was discovered that PostgreSQL versions before 10.5, 9.6.10, 9.5.14, 9.4.19, and 9.3.24 failed to properly check authorization on certain statements involved with "INSERT ... ON CONFLICT DO UPDATE". An attacker with "CREATE TABLE" privileges could exploit this to read arbitrary bytes server memory. If the attacker also had certain "INSERT" and limited "UPDATE" privileges to a particular table, they could exploit this to update other columns in the same table.
Релиз | Статус | Примечание |
---|---|---|
bionic | released | 10.5-0ubuntu0.18.04 |
devel | not-affected | 10.5-1 |
esm-infra-legacy/trusty | DNE | |
esm-infra/bionic | not-affected | 10.5-0ubuntu0.18.04 |
precise/esm | DNE | |
trusty | DNE | |
trusty/esm | DNE | |
upstream | released | 10.5-1 |
xenial | DNE |
Показывать по
Релиз | Статус | Примечание |
---|---|---|
bionic | DNE | |
devel | DNE | |
esm-infra-legacy/trusty | DNE | trusty/esm was DNE [trusty was not-affected [code not present]] |
precise/esm | not-affected | code not present |
trusty | not-affected | code not present |
trusty/esm | DNE | trusty was not-affected [code not present] |
upstream | not-affected | code not present |
xenial | DNE |
Показывать по
Релиз | Статус | Примечание |
---|---|---|
bionic | DNE | |
devel | DNE | |
esm-infra-legacy/trusty | not-affected | code not present |
precise/esm | DNE | |
trusty | not-affected | code not present |
trusty/esm | not-affected | code not present |
upstream | not-affected | code not present |
xenial | DNE |
Показывать по
Релиз | Статус | Примечание |
---|---|---|
bionic | DNE | |
devel | DNE | |
esm-infra-legacy/trusty | DNE | |
esm-infra/xenial | not-affected | 9.5.14-0ubuntu0.16.04 |
precise/esm | DNE | |
trusty | DNE | |
trusty/esm | DNE | |
upstream | released | 9.5.14 |
xenial | released | 9.5.14-0ubuntu0.16.04 |
Показывать по
EPSS
5.5 Medium
CVSS2
8.1 High
CVSS3
Связанные уязвимости
It was discovered that PostgreSQL versions before 10.5, 9.6.10, 9.5.14, 9.4.19, and 9.3.24 failed to properly check authorization on certain statements involved with "INSERT ... ON CONFLICT DO UPDATE". An attacker with "CREATE TABLE" privileges could exploit this to read arbitrary bytes server memory. If the attacker also had certain "INSERT" and limited "UPDATE" privileges to a particular table, they could exploit this to update other columns in the same table.
It was discovered that PostgreSQL versions before 10.5, 9.6.10, 9.5.14, 9.4.19, and 9.3.24 failed to properly check authorization on certain statements involved with "INSERT ... ON CONFLICT DO UPDATE". An attacker with "CREATE TABLE" privileges could exploit this to read arbitrary bytes server memory. If the attacker also had certain "INSERT" and limited "UPDATE" privileges to a particular table, they could exploit this to update other columns in the same table.
It was discovered that PostgreSQL versions before 10.5, 9.6.10, 9.5.14 ...
It was discovered that PostgreSQL versions before 10.5, 9.6.10, 9.5.14, 9.4.19, and 9.3.24 failed to properly check authorization on certain statements involved with "INSERT ... ON CONFLICT DO UPDATE". An attacker with "CREATE TABLE" privileges could exploit this to read arbitrary bytes server memory. If the attacker also had certain "INSERT" and limited "UPDATE" privileges to a particular table, they could exploit this to update other columns in the same table.
Уязвимость системы управления базами данных PostgreSQL, связанная с ошибками авторизации, позволяющая нарушителю повысить свои привилегии
EPSS
5.5 Medium
CVSS2
8.1 High
CVSS3