A vulnerability was found in postgresql versions 11.x prior to 11.3. The Windows installer for EnterpriseDB-supplied PostgreSQL does not lock down the ACL of the binary installation directory or the ACL of the data directory; it keeps the inherited ACL. In the default configuration, this allows a local attacker to read arbitrary data directory files, essentially bypassing database-imposed read access limitations. In plausible non-default configurations, an attacker having both an unprivileged Windows account and an unprivileged PostgreSQL account can cause the PostgreSQL service account to execute arbitrary code.
2021-03-19T20:15:12.973
2024-11-21T04:18:28.417
Modified
CVSSv3.1: 7.8 (HIGH)
AV:L/AC:M/Au:S/C:P/I:P/A:P
2.7
6.4
Type | Vendor | Product | Version/Range | Vulnerable? |
---|---|---|---|---|
Application | postgresql | postgresql | < 9.4.22 | Yes |
Application | postgresql | postgresql | < 9.5.17 | Yes |
Application | postgresql | postgresql | < 9.6.13 | Yes |
Application | postgresql | postgresql | < 10.8 | Yes |
Application | postgresql | postgresql | < 11.3 | Yes |
Operating System | microsoft | windows | - | No |