IN THE EXTENSION SCRIPT, a SQL Injection vulnerability was found in PostgreSQL if it uses @extowner@, @extschema@, or @extschema:...@ inside a quoting construct (dollar quoting, '', or ""). If an administrator has installed files of a vulnerable, trusted, non-bundled extension, an attacker with database-level CREATE privilege can execute arbitrary code as the bootstrap superuser.
References
Configurations
Configuration 1 (hide)
|
Configuration 2 (hide)
|
Configuration 3 (hide)
|
History
16 Feb 2024, 15:20
| Type | Values Removed | Values Added |
|---|---|---|
| CPE | cpe:2.3:o:debian:debian_linux:11.0:*:*:*:*:*:*:* cpe:2.3:o:debian:debian_linux:12.0:*:*:*:*:*:*:* |
|
| References | () https://access.redhat.com/errata/RHSA-2023:7545 - Third Party Advisory | |
| References | () https://access.redhat.com/errata/RHSA-2023:7579 - Third Party Advisory | |
| References | () https://access.redhat.com/errata/RHSA-2023:7580 - Third Party Advisory | |
| References | () https://access.redhat.com/errata/RHSA-2023:7581 - Third Party Advisory | |
| References | () https://access.redhat.com/errata/RHSA-2023:7616 - Third Party Advisory | |
| References | () https://access.redhat.com/errata/RHSA-2023:7656 - Third Party Advisory | |
| References | () https://access.redhat.com/errata/RHSA-2023:7666 - Third Party Advisory | |
| References | () https://access.redhat.com/errata/RHSA-2023:7667 - Third Party Advisory | |
| References | () https://access.redhat.com/errata/RHSA-2023:7694 - Third Party Advisory | |
| References | () https://access.redhat.com/errata/RHSA-2023:7695 - Third Party Advisory | |
| References | () https://access.redhat.com/errata/RHSA-2023:7714 - Third Party Advisory | |
| References | () https://access.redhat.com/errata/RHSA-2023:7770 - Third Party Advisory | |
| References | () https://access.redhat.com/errata/RHSA-2023:7772 - Third Party Advisory | |
| References | () https://access.redhat.com/errata/RHSA-2023:7784 - Third Party Advisory | |
| References | () https://access.redhat.com/errata/RHSA-2023:7785 - Third Party Advisory | |
| References | () https://access.redhat.com/errata/RHSA-2023:7883 - Third Party Advisory | |
| References | () https://access.redhat.com/errata/RHSA-2023:7884 - Third Party Advisory | |
| References | () https://access.redhat.com/errata/RHSA-2023:7885 - Third Party Advisory | |
| References | () https://access.redhat.com/errata/RHSA-2024:0304 - Third Party Advisory | |
| References | () https://access.redhat.com/errata/RHSA-2024:0332 - Third Party Advisory | |
| References | () https://access.redhat.com/errata/RHSA-2024:0337 - Third Party Advisory | |
| References | () https://www.debian.org/security/2023/dsa-5553 - Third Party Advisory | |
| References | () https://www.debian.org/security/2023/dsa-5554 - Third Party Advisory |
25 Jan 2024, 09:15
| Type | Values Removed | Values Added |
|---|---|---|
| References |
|
22 Jan 2024, 21:15
| Type | Values Removed | Values Added |
|---|---|---|
| References |
|
19 Jan 2024, 03:15
| Type | Values Removed | Values Added |
|---|---|---|
| References |
|
Information
Published : 2023-08-11 13:15
Updated : 2024-02-16 15:20
NVD link : CVE-2023-39417
Mitre link : CVE-2023-39417
CVE.ORG link : CVE-2023-39417
JSON object : View
Products Affected
redhat
- software_collections
- enterprise_linux
postgresql
- postgresql
debian
- debian_linux
CWE
CWE-89
Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')
