Lucene search

K
freebsdFreeBSD157CE083-D145-11EC-AB9B-6CC21735F730
HistoryMay 11, 2022 - 12:00 a.m.

PostgreSQL Server -- execute arbitrary SQL code as DBA user

2022-05-1100:00:00
vuxml.freebsd.org
13

8.8 High

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

LOW

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H

6.5 Medium

CVSS2

Access Vector

NETWORK

Access Complexity

LOW

Authentication

SINGLE

Confidentiality Impact

PARTIAL

Integrity Impact

PARTIAL

Availability Impact

PARTIAL

AV:N/AC:L/Au:S/C:P/I:P/A:P

0.002 Low

EPSS

Percentile

61.5%

The PostgreSQL project reports:

    Confine additional operations within "security restricted
    operation" sandboxes.
  

    Autovacuum, CLUSTER, CREATE INDEX, REINDEX, REFRESH MATERIALIZED VIEW,
    and pg_amcheck activated the "security restricted operation" protection
    mechanism too late, or even not at all in some code paths.
    A user having permission to create non-temporary objects within a
    database could define an object that would execute arbitrary SQL
    code with superuser permissions the next time that autovacuum
    processed the object, or that some superuser ran one of the affected
    commands against it.

8.8 High

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

LOW

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H

6.5 Medium

CVSS2

Access Vector

NETWORK

Access Complexity

LOW

Authentication

SINGLE

Confidentiality Impact

PARTIAL

Integrity Impact

PARTIAL

Availability Impact

PARTIAL

AV:N/AC:L/Au:S/C:P/I:P/A:P

0.002 Low

EPSS

Percentile

61.5%