Information Exposure Affecting rh-postgresql96-postgresql-server-syspaths package, versions <0:9.6.10-1.el7


Severity

Recommended
high

Based on Red Hat Enterprise Linux security rating.

Threat Intelligence

EPSS
0.21% (59th percentile)

Do your applications use this vulnerable package?

In a few clicks we can analyze your entire application and see what components are vulnerable in your application, and suggest you quick fixes.

Test your applications
  • Snyk IDSNYK-RHEL7-RHPOSTGRESQL96POSTGRESQLSERVERSYSPATHS-4772869
  • published1 Nov 2021
  • disclosed9 Nov 2017

Introduced: 9 Nov 2017

CVE-2017-15099  (opens in a new tab)
CWE-200  (opens in a new tab)

How to fix?

Upgrade RHEL:7 rh-postgresql96-postgresql-server-syspaths to version 0:9.6.10-1.el7 or higher.
This issue was patched in RHSA-2018:2566.

NVD Description

Note: Versions mentioned in the description apply only to the upstream rh-postgresql96-postgresql-server-syspaths package and not the rh-postgresql96-postgresql-server-syspaths package as distributed by RHEL. See How to fix? for RHEL:7 relevant fixed versions and status.

INSERT ... ON CONFLICT DO UPDATE commands in PostgreSQL 10.x before 10.1, 9.6.x before 9.6.6, and 9.5.x before 9.5.10 disclose table contents that the invoker lacks privilege to read. These exploits affect only tables where the attacker lacks full read access but has both INSERT and UPDATE privileges. Exploits bypass row level security policies and lack of SELECT privilege.