7.1 High
CVSS3
Attack Vector
NETWORK
Attack Complexity
LOW
Privileges Required
LOW
User Interaction
NONE
Scope
UNCHANGED
Confidentiality Impact
HIGH
Integrity Impact
LOW
Availability Impact
NONE
CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:L/A:N
7.8 High
AI Score
Confidence
High
0.001 Low
EPSS
Percentile
49.7%
It was discovered that PostgreSQL versions before 10.5, 9.6.10, 9.5.14, 9.4.19, and 9.3.24 failed to properly check authorization on certain statements involved with “INSERT … ON CONFLICT DO UPDATE”. An attacker with “CREATE TABLE” privileges could exploit this to read arbitrary bytes server memory. If the attacker also had certain “INSERT” and limited “UPDATE” privileges to a particular table, they could exploit this to update other columns in the same table.
[
{
"product": "postgresql",
"vendor": "PostgreSQL Global Development Group",
"versions": [
{
"status": "affected",
"version": "10.5"
},
{
"status": "affected",
"version": "9.6.10"
},
{
"status": "affected",
"version": "9.5.14"
},
{
"status": "affected",
"version": "9.4.19"
},
{
"status": "affected",
"version": "9.3.24"
}
]
}
]
lists.opensuse.org/opensuse-security-announce/2020-08/msg00043.html
www.securityfocus.com/bid/105052
www.securitytracker.com/id/1041446
access.redhat.com/errata/RHSA-2018:2511
access.redhat.com/errata/RHSA-2018:2565
access.redhat.com/errata/RHSA-2018:2566
access.redhat.com/errata/RHSA-2018:3816
bugzilla.redhat.com/show_bug.cgi?id=CVE-2018-10925
security.gentoo.org/glsa/201810-08
usn.ubuntu.com/3744-1/
www.debian.org/security/2018/dsa-4269
www.postgresql.org/about/news/1878/
7.1 High
CVSS3
Attack Vector
NETWORK
Attack Complexity
LOW
Privileges Required
LOW
User Interaction
NONE
Scope
UNCHANGED
Confidentiality Impact
HIGH
Integrity Impact
LOW
Availability Impact
NONE
CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:L/A:N
7.8 High
AI Score
Confidence
High
0.001 Low
EPSS
Percentile
49.7%