CVE-2023-39417

CVE Details

Release Date:2023-08-10
Impact:Moderate What is this?

Description


IN THE EXTENSION SCRIPT, a SQL Injection vulnerability was found in PostgreSQL if it uses @extowner@, @extschema@, or @extschema:...@ inside a quoting construct (dollar quoting, '', or \\). If an administrator has installed files of a vulnerable, trusted, non-bundled extension, an attacker with database-level CREATE privilege can execute arbitrary code as the bootstrap superuser.

See more information about CVE-2023-39417 from MITRE CVE dictionary and NIST NVD


NOTE: The following CVSS metrics and score provided are preliminary and subject to review.


CVSS v3 metrics

Base Score: 7.5
Vector String: CVSS:3.0/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
Version: 3.0
Attack Vector: Network
Attack Complexity: High
Privileges Required: Low
User Interaction: None
Scope: Unchanged
Confidentiality Impact: High
Integrity Impact: High
Availability Impact: High

Errata information


PlatformErrataRelease Date
Oracle Linux version 8 (pg_repack)ELSA-2023-75812023-11-30
Oracle Linux version 8 (pg_repack)ELSA-2023-77142023-12-18
Oracle Linux version 8 (pg_repack)ELSA-2023-78842023-12-20
Oracle Linux version 8 (pgaudit)ELSA-2023-75812023-11-30
Oracle Linux version 8 (pgaudit)ELSA-2023-77142023-12-18
Oracle Linux version 8 (pgaudit)ELSA-2023-78842023-12-20
Oracle Linux version 8 (postgres-decoderbufs)ELSA-2023-75812023-11-30
Oracle Linux version 8 (postgres-decoderbufs)ELSA-2023-77142023-12-18
Oracle Linux version 8 (postgres-decoderbufs)ELSA-2023-78842023-12-20
Oracle Linux version 8 (postgresql)ELSA-2023-75812023-11-30
Oracle Linux version 8 (postgresql)ELSA-2023-77142023-12-18
Oracle Linux version 8 (postgresql)ELSA-2023-78842023-12-20
Oracle Linux version 9 (pg_repack)ELSA-2023-77852023-12-13
Oracle Linux version 9 (pgaudit)ELSA-2023-77852023-12-13
Oracle Linux version 9 (postgres-decoderbufs)ELSA-2023-77852023-12-13
Oracle Linux version 9 (postgresql)ELSA-2023-77842023-12-15
Oracle Linux version 9 (postgresql)ELSA-2023-77852023-12-13


This page is generated automatically and has not been checked for errors or omissions. For clarification or corrections:

software.hardware.complete