SQL Injection Affecting postgresql package, versions <0:9.2.24-6.amzn2


Severity

Recommended
0.0
high
0
10

Based on Amazon Linux security rating.

Threat Intelligence

EPSS
22.67% (96th percentile)

Do your applications use this vulnerable package?

In a few clicks we can analyze your entire application and see what components are vulnerable in your application, and suggest you quick fixes.

Test your applications
  • Snyk IDSNYK-AMZN2-POSTGRESQL-1700874
  • published27 Sept 2021
  • disclosed16 Nov 2020

Introduced: 16 Nov 2020

CVE-2020-25695  (opens in a new tab)
CWE-89  (opens in a new tab)

How to fix?

Upgrade Amazon-Linux:2 postgresql to version 0:9.2.24-6.amzn2 or higher.
This issue was patched in ALAS2-2021-1665.

NVD Description

Note: Versions mentioned in the description apply only to the upstream postgresql package and not the postgresql package as distributed by Amazon-Linux. See How to fix? for Amazon-Linux:2 relevant fixed versions and status.

A flaw was found in PostgreSQL versions before 13.1, before 12.5, before 11.10, before 10.15, before 9.6.20 and before 9.5.24. An attacker having permission to create non-temporary objects in at least one schema can execute arbitrary SQL functions under the identity of a superuser. The highest threat from this vulnerability is to data confidentiality and integrity as well as system availability.

CVSS Base Scores

version 3.1