Lucene search

K
freebsdFreeBSD48E6D514-5568-11EF-AF48-6CC21735F730
HistoryAug 08, 2024 - 12:00 a.m.

PostgreSQL -- Prevent unauthorized code execution during pg_dump

2024-08-0800:00:00
vuxml.freebsd.org
7
postgresql
unauthorized code execution
pg_dump
privilege escalation
security patch

CVSS3

8.8

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

LOW

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H

AI Score

8.1

Confidence

Low

EPSS

0.001

Percentile

20.0%

PostgreSQL project reports:

     An attacker able to create and drop non-temporary objects could
     inject SQL code that would be executed by a concurrent pg_dump
     session with the privileges of the role running pg_dump
     (which is often a superuser). The attack involves replacing a
     sequence or similar object with a view or foreign table that will
     execute malicious code. To prevent this, introduce a new server
     parameter restrict_nonsystem_relation_kind that can disable
     expansion of non-builtin views as well as access to foreign
     tables, and teach pg_dump to set it when available. Note that the
     attack is prevented only if both pg_dump and the server it is
     dumping from are new enough to have this fix.

CVSS3

8.8

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

LOW

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H

AI Score

8.1

Confidence

Low

EPSS

0.001

Percentile

20.0%