Lucene search

K
cvelistGitHub_MCVELIST:CVE-2023-32305
HistoryMay 12, 2023 - 6:46 p.m.

CVE-2023-32305 aiven-extras PostgreSQL Privilege Escalation Through Overloaded Search Path

2023-05-1218:46:55
CWE-20
CWE-1321
GitHub_M
www.cve.org
4
cve-2023-32305
aiven-extras
postgresql
privilege escalation
vulnerability
superuser
schema qualifiers
arbitrary code execution
data access
patched

CVSS3

8.8

Attack Vector

LOCAL

Attack Complexity

LOW

Privileges Required

LOW

User Interaction

NONE

Scope

CHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H

EPSS

0.003

Percentile

68.3%

aiven-extras is a PostgreSQL extension. Versions prior to 1.1.9 contain a privilege escalation vulnerability, allowing elevation to superuser inside PostgreSQL databases that use the aiven-extras package. The vulnerability leverages missing schema qualifiers on privileged functions called by the aiven-extras extension. A low privileged user can create objects that collide with existing function names, which will then be executed instead. Exploiting this vulnerability could allow a low privileged user to acquire superuser privileges, which would allow full, unrestricted access to all data and database functions. And could lead to arbitrary code execution or data access on the underlying host as the postgres user. The issue has been patched as of version 1.1.9.

CNA Affected

[
  {
    "vendor": "aiven",
    "product": "aiven-extras",
    "versions": [
      {
        "version": "< 1.1.9",
        "status": "affected"
      }
    ]
  }
]

CVSS3

8.8

Attack Vector

LOCAL

Attack Complexity

LOW

Privileges Required

LOW

User Interaction

NONE

Scope

CHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H

EPSS

0.003

Percentile

68.3%

Related for CVELIST:CVE-2023-32305