Lucene search

K
broadcomBroadcom Security ResponseBSNSA23259
HistoryApr 16, 2024 - 12:00 a.m.

Extension script @substitutions@ within quoting allow SQL injection (CVE-2023-39417)

2024-04-1600:00:00
Broadcom Security Response
support.broadcom.com
10
extension script
sql injection
vulnerability
cve-2023-39417
quoting
postgresql
administrator
create privilege
arbitrary code
bootstrap superuser
non-bundled extensions
documentation
trusted
core server
block .

7.9 High

AI Score

Confidence

High

0.001 Low

EPSS

Percentile

50.6%

An extension script is vulnerable if it uses @extowner@, @extschema@, or @extschema:...@ inside a quoting construct (dollar quoting, '', or ""). No bundled extension is vulnerable. Vulnerable uses do appear in a documentation example and in non-bundled extensions. Hence, the attack prerequisite is an administrator having installed files of a vulnerable, trusted, non-bundled extension. Subject to that prerequisite, this enables an attacker having database-level CREATE privilege to execute arbitrary code as the bootstrap superuser. PostgreSQL will block this attack in the core server, so there’s no need to modify individual extensions.

Affected configurations

Vulners
Node
broadcombrocade_sannavRange<2.3.0a
CPENameOperatorVersion
brocade sannavlt2.3.0a