Arbitrary Code Execution Affecting postgresql package, versions [,10.22)[11.0,11.17)[12.0,12.12)[13.0,13.8)[14.0,14.5)


Severity

Recommended
0.0
high
0
10

CVSS assessment made by Snyk's Security Team. Learn more

Threat Intelligence

EPSS
0.23% (62nd percentile)

Do your applications use this vulnerable package?

In a few clicks we can analyze your entire application and see what components are vulnerable in your application, and suggest you quick fixes.

Test your applications

Snyk Learn

Learn about Arbitrary Code Execution vulnerabilities in an interactive lesson.

Start learning
  • Snyk IDSNYK-UNMANAGED-POSTGRESQL-2986977
  • published18 Aug 2022
  • disclosed11 Aug 2022
  • creditSven Klemm

Introduced: 11 Aug 2022

CVE-2022-2625  (opens in a new tab)
CWE-915  (opens in a new tab)

How to fix?

Upgrade postgresql to version 10.22, 11.17, 12.12, 13.8, 14.5 or higher.

Overview

Affected versions of this package are vulnerable to Arbitrary Code Execution due to not checking the ownership of an extension before allowing a user to execute CREATE OR REPLACE or CREATE IF NOT EXISTS on it. A attacker who has created a malicious object, and then convinced an administrator to modify that object and convinced a user to execute one of the above CREATE statements involving the malicious object, can run arbitrary code with the privileges of that user.

CVSS Scores

version 3.1