8.1 High
CVSS3
Attack Vector
NETWORK
Attack Complexity
LOW
Privileges Required
LOW
User Interaction
NONE
Scope
UNCHANGED
Confidentiality Impact
HIGH
Integrity Impact
HIGH
Availability Impact
NONE
CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N
5.5 Medium
CVSS2
Access Vector
NETWORK
Access Complexity
LOW
Authentication
SINGLE
Confidentiality Impact
PARTIAL
Integrity Impact
PARTIAL
Availability Impact
NONE
AV:N/AC:L/Au:S/C:P/I:P/A:N
Postgresql is vulnerable to authorization bypass vulnerability. This is because PostgreSQL fails to properly check authorization on certain statements involved with “INSERT … ON CONFLICT DO UPDATE”. An attacker with “CREATE TABLE”, certain “INSERT” and limited “UPDATE” privileges to a particular table could exploit this issue to gain access to sensitive information that may lead to authorization bypass attacks.
lists.opensuse.org/opensuse-security-announce/2020-08/msg00043.html
www.securityfocus.com/bid/105052
www.securitytracker.com/id/1041446
access.redhat.com/documentation/en-us/red_hat_cloudforms/4.6/html/release_notes
access.redhat.com/errata/RHSA-2018:2511
access.redhat.com/errata/RHSA-2018:2565
access.redhat.com/errata/RHSA-2018:2566
access.redhat.com/errata/RHSA-2018:3466
access.redhat.com/errata/RHSA-2018:3816
access.redhat.com/security/updates/classification/#important
bugzilla.redhat.com/show_bug.cgi?id=1610547
bugzilla.redhat.com/show_bug.cgi?id=1618836
bugzilla.redhat.com/show_bug.cgi?id=1623562
bugzilla.redhat.com/show_bug.cgi?id=1634809
bugzilla.redhat.com/show_bug.cgi?id=1635034
bugzilla.redhat.com/show_bug.cgi?id=1635255
bugzilla.redhat.com/show_bug.cgi?id=1635759
bugzilla.redhat.com/show_bug.cgi?id=1635788
bugzilla.redhat.com/show_bug.cgi?id=1638501
bugzilla.redhat.com/show_bug.cgi?id=1639351
bugzilla.redhat.com/show_bug.cgi?id=1639353
bugzilla.redhat.com/show_bug.cgi?id=1639364
bugzilla.redhat.com/show_bug.cgi?id=1640194
bugzilla.redhat.com/show_bug.cgi?id=1640258
bugzilla.redhat.com/show_bug.cgi?id=1640629
bugzilla.redhat.com/show_bug.cgi?id=1640631
bugzilla.redhat.com/show_bug.cgi?id=1641771
bugzilla.redhat.com/show_bug.cgi?id=1643042
bugzilla.redhat.com/show_bug.cgi?id=1643261
bugzilla.redhat.com/show_bug.cgi?id=1643263
bugzilla.redhat.com/show_bug.cgi?id=1643539
bugzilla.redhat.com/show_bug.cgi?id=1643959
bugzilla.redhat.com/show_bug.cgi?id=1644410
bugzilla.redhat.com/show_bug.cgi?id=1645198
bugzilla.redhat.com/show_bug.cgi?id=1645204
bugzilla.redhat.com/show_bug.cgi?id=1646435
bugzilla.redhat.com/show_bug.cgi?id=1646561
bugzilla.redhat.com/show_bug.cgi?id=1646564
bugzilla.redhat.com/show_bug.cgi?id=1646571
bugzilla.redhat.com/show_bug.cgi?id=1646599
bugzilla.redhat.com/show_bug.cgi?id=1646604
bugzilla.redhat.com/show_bug.cgi?id=1646605
bugzilla.redhat.com/show_bug.cgi?id=1646606
bugzilla.redhat.com/show_bug.cgi?id=1646613
bugzilla.redhat.com/show_bug.cgi?id=1646629
bugzilla.redhat.com/show_bug.cgi?id=1646646
bugzilla.redhat.com/show_bug.cgi?id=1647056
bugzilla.redhat.com/show_bug.cgi?id=1647108
bugzilla.redhat.com/show_bug.cgi?id=1647188
bugzilla.redhat.com/show_bug.cgi?id=1647489
bugzilla.redhat.com/show_bug.cgi?id=1648674
bugzilla.redhat.com/show_bug.cgi?id=1648948
bugzilla.redhat.com/show_bug.cgi?id=1648955
bugzilla.redhat.com/show_bug.cgi?id=1648991
bugzilla.redhat.com/show_bug.cgi?id=1649033
bugzilla.redhat.com/show_bug.cgi?id=1649380
bugzilla.redhat.com/show_bug.cgi?id=1649419
bugzilla.redhat.com/show_bug.cgi?id=1650691
bugzilla.redhat.com/show_bug.cgi?id=1651291
bugzilla.redhat.com/show_bug.cgi?id=1651347
bugzilla.redhat.com/show_bug.cgi?id=1651391
bugzilla.redhat.com/show_bug.cgi?id=1653417
bugzilla.redhat.com/show_bug.cgi?id=1653710
bugzilla.redhat.com/show_bug.cgi?id=1654436
bugzilla.redhat.com/show_bug.cgi?id=1654463
bugzilla.redhat.com/show_bug.cgi?id=1655081
bugzilla.redhat.com/show_bug.cgi?id=1655143
bugzilla.redhat.com/show_bug.cgi?id=1655773
bugzilla.redhat.com/show_bug.cgi?id=1656168
bugzilla.redhat.com/show_bug.cgi?id=1656169
bugzilla.redhat.com/show_bug.cgi?id=CVE-2018-10925
security.gentoo.org/glsa/201810-08
usn.ubuntu.com/3744-1/
www.debian.org/security/2018/dsa-4269
www.postgresql.org/about/news/1878/
8.1 High
CVSS3
Attack Vector
NETWORK
Attack Complexity
LOW
Privileges Required
LOW
User Interaction
NONE
Scope
UNCHANGED
Confidentiality Impact
HIGH
Integrity Impact
HIGH
Availability Impact
NONE
CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N
5.5 Medium
CVSS2
Access Vector
NETWORK
Access Complexity
LOW
Authentication
SINGLE
Confidentiality Impact
PARTIAL
Integrity Impact
PARTIAL
Availability Impact
NONE
AV:N/AC:L/Au:S/C:P/I:P/A:N