It was found that some PostgreSQL extensions did not use search_path safely in their installation script. An attacker with sufficient privileges could use this flaw to trick an administrator into executing a specially crafted script, during the installation or update of such extension. This affects PostgreSQL versions before 12.4, before 11.9, before 10.14, before 9.6.19, and before 9.5.23.
2020-08-24T13:15:10.967
2024-11-21T05:03:04.240
Modified
CVSSv3.1: 7.3 (HIGH)
AV:L/AC:M/Au:N/C:P/I:P/A:P
3.4
6.4
Type | Vendor | Product | Version/Range | Vulnerable? |
---|---|---|---|---|
Application | postgresql | postgresql | < 9.5.23 | Yes |
Application | postgresql | postgresql | < 9.6.19 | Yes |
Application | postgresql | postgresql | < 10.14 | Yes |
Application | postgresql | postgresql | < 11.9 | Yes |
Application | postgresql | postgresql | < 12.4 | Yes |
Operating System | debian | debian_linux | 9.0 | Yes |
Operating System | opensuse | leap | 15.1 | Yes |
Operating System | opensuse | leap | 15.2 | Yes |
Operating System | canonical | ubuntu_linux | 16.04 | Yes |
Operating System | canonical | ubuntu_linux | 18.04 | Yes |
Operating System | canonical | ubuntu_linux | 20.04 | Yes |