It was found that PostgreSQL versions before 12.4, before 11.9 and before 10.14 did not properly sanitize the search_path during logical replication. An authenticated attacker could use this flaw in an attack similar to CVE-2018-1058, in order to execute arbitrary SQL command in the context of the user used for replication.
References
Link | Resource |
---|---|
http://lists.opensuse.org/opensuse-security-announce/2020-08/msg00044.html | Broken Link Mailing List Third Party Advisory |
http://lists.opensuse.org/opensuse-security-announce/2020-08/msg00049.html | Mailing List Third Party Advisory |
http://lists.opensuse.org/opensuse-security-announce/2020-08/msg00050.html | Mailing List Third Party Advisory |
http://lists.opensuse.org/opensuse-security-announce/2020-09/msg00003.html | Mailing List Third Party Advisory |
http://lists.opensuse.org/opensuse-security-announce/2020-09/msg00008.html | Mailing List Third Party Advisory |
https://bugzilla.redhat.com/show_bug.cgi?id=1865744 | Issue Tracking Third Party Advisory |
https://security.gentoo.org/glsa/202008-13 | Third Party Advisory |
https://security.netapp.com/advisory/ntap-20200918-0002/ | Third Party Advisory |
https://usn.ubuntu.com/4472-1/ | Third Party Advisory |
Configurations
History
No history.
Information
Published : 2020-08-24 13:15
Updated : 2024-02-04 21:00
NVD link : CVE-2020-14349
Mitre link : CVE-2020-14349
CVE.ORG link : CVE-2020-14349
JSON object : View
Products Affected
postgresql
- postgresql
opensuse
- leap