IN THE EXTENSION SCRIPT, a SQL Injection vulnerability was found in PostgreSQL if it uses @extowner@, @extschema@, or @extschema:...@ inside a quoting construct (dollar quoting, '', or ""). If an administrator has installed files of a vulnerable, trusted, non-bundled extension, an attacker with database-level CREATE privilege can execute arbitrary code as the bootstrap superuser.
References
Configurations
Configuration 1 (hide)
|
Configuration 2 (hide)
|
Configuration 3 (hide)
|
History
No history.
Information
Published : 2023-08-11 13:15
Updated : 2024-02-16 15:20
NVD link : CVE-2023-39417
Mitre link : CVE-2023-39417
CVE.ORG link : CVE-2023-39417
JSON object : View
Products Affected
debian
- debian_linux
postgresql
- postgresql
redhat
- enterprise_linux
- software_collections
CWE
CWE-89
Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')