Untrusted Search Path Affecting postgresql14 package, versions <12.4-r0


Severity

Recommended
0.0
high
0
10

Snyk's Security Team recommends NVD's CVSS assessment

    Threat Intelligence

    EPSS
    0.05% (16th percentile)

Do your applications use this vulnerable package?

In a few clicks we can analyze your entire application and see what components are vulnerable in your application, and suggest you quick fixes.

Test your applications
  • Snyk ID SNYK-ALPINE318-POSTGRESQL14-5513987
  • published 6 Sep 2020
  • disclosed 24 Aug 2020

How to fix?

Upgrade Alpine:3.18 postgresql14 to version 12.4-r0 or higher.

NVD Description

Note: Versions mentioned in the description apply only to the upstream postgresql14 package and not the postgresql14 package as distributed by Alpine. See How to fix? for Alpine:3.18 relevant fixed versions and status.

It was found that some PostgreSQL extensions did not use search_path safely in their installation script. An attacker with sufficient privileges could use this flaw to trick an administrator into executing a specially crafted script, during the installation or update of such extension. This affects PostgreSQL versions before 12.4, before 11.9, before 10.14, before 9.6.19, and before 9.5.23.

CVSS Scores

version 3.1
Expand this section

NVD

Recommended
7.3 high
  • Attack Vector (AV)
    Local
  • Attack Complexity (AC)
    Low
  • Privileges Required (PR)
    Low
  • User Interaction (UI)
    Required
  • Scope (S)
    Unchanged
  • Confidentiality (C)
    High
  • Integrity (I)
    High
  • Availability (A)
    High
Expand this section

SUSE

7.3 high
Expand this section

Red Hat

7.1 high