It was found that PostgreSQL versions before 12.4, before 11.9 and before 10.14 did not properly sanitize the search_path during logical replication. An authenticated attacker could use this flaw in an attack similar to CVE-2018-1058, in order to execute arbitrary SQL command in the context of the user used for replication.
The product constructs all or part of an SQL command using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify the intended SQL command when it is sent to a downstream component. Without sufficient removal or quoting of SQL syntax in user-controllable inputs, the generated SQL query can cause those inputs to be interpreted as SQL instead of ordinary user data.
Link | Tags |
---|---|
http://lists.opensuse.org/opensuse-security-announce/2020-08/msg00044.html | mailing list broken link third party advisory vendor advisory |
http://lists.opensuse.org/opensuse-security-announce/2020-08/msg00049.html | mailing list third party advisory vendor advisory |
http://lists.opensuse.org/opensuse-security-announce/2020-08/msg00050.html | mailing list third party advisory vendor advisory |
https://bugzilla.redhat.com/show_bug.cgi?id=1865744 | issue tracking third party advisory |
https://security.gentoo.org/glsa/202008-13 | third party advisory vendor advisory |
https://usn.ubuntu.com/4472-1/ | third party advisory vendor advisory |
http://lists.opensuse.org/opensuse-security-announce/2020-09/msg00003.html | mailing list third party advisory vendor advisory |
http://lists.opensuse.org/opensuse-security-announce/2020-09/msg00008.html | mailing list third party advisory vendor advisory |
https://security.netapp.com/advisory/ntap-20200918-0002/ | third party advisory |