First published: Fri Aug 17 2012(Updated: )
An XML External Entities (XXE) attack was found in the way xml2 contrib module, providing XPath querying and XSLT functionality, of PostgreSQL, an advanced Object-Relational database management system (DBMS), performed processing of XSLT documents. When the xml2 contrib module was enabled an unprivileged database user could issue a specially-crafted SQL query to the PostgreSQL server that, when processed could lead to attacker's ability to read or write (alter) arbitrary system files, accessible with the privileges of the user running the PostgreSQL server. References: [1] <a href="http://www.postgresql.org/docs/8.3/static/release-8-3-20.html">http://www.postgresql.org/docs/8.3/static/release-8-3-20.html</a> [2] <a href="http://www.postgresql.org/docs/9.0/static/release-9-0-9.html">http://www.postgresql.org/docs/9.0/static/release-9-0-9.html</a> [3] <a href="http://www.postgresql.org/docs/9.1/static/release-9-1-5.html">http://www.postgresql.org/docs/9.1/static/release-9-1-5.html</a>
Credit: secalert@redhat.com
Affected Software | Affected Version | How to fix |
---|---|---|
redhat/postgresql | <9.1.5 | 9.1.5 |
redhat/postgresql | <9.0.9 | 9.0.9 |
redhat/postgresql | <8.4.13 | 8.4.13 |
redhat/postgresql | <8.3.20 | 8.3.20 |
PostgreSQL PostgreSQL | =9.1 | |
PostgreSQL PostgreSQL | =9.1.1 | |
PostgreSQL PostgreSQL | =9.1.2 | |
PostgreSQL PostgreSQL | =9.1.3 | |
PostgreSQL PostgreSQL | =9.1.4 | |
PostgreSQL PostgreSQL | =8.4 | |
PostgreSQL PostgreSQL | =8.4.1 | |
PostgreSQL PostgreSQL | =8.4.2 | |
PostgreSQL PostgreSQL | =8.4.3 | |
PostgreSQL PostgreSQL | =8.4.4 | |
PostgreSQL PostgreSQL | =8.4.5 | |
PostgreSQL PostgreSQL | =8.4.6 | |
PostgreSQL PostgreSQL | =8.4.7 | |
PostgreSQL PostgreSQL | =8.4.8 | |
PostgreSQL PostgreSQL | =8.4.9 | |
PostgreSQL PostgreSQL | =8.4.10 | |
PostgreSQL PostgreSQL | =8.4.11 | |
PostgreSQL PostgreSQL | =8.4.12 | |
PostgreSQL PostgreSQL | =8.3 | |
PostgreSQL PostgreSQL | =8.3.1 | |
PostgreSQL PostgreSQL | =8.3.2 | |
PostgreSQL PostgreSQL | =8.3.3 | |
PostgreSQL PostgreSQL | =8.3.4 | |
PostgreSQL PostgreSQL | =8.3.5 | |
PostgreSQL PostgreSQL | =8.3.6 | |
PostgreSQL PostgreSQL | =8.3.7 | |
PostgreSQL PostgreSQL | =8.3.8 | |
PostgreSQL PostgreSQL | =8.3.9 | |
PostgreSQL PostgreSQL | =8.3.10 | |
PostgreSQL PostgreSQL | =8.3.11 | |
PostgreSQL PostgreSQL | =8.3.12 | |
PostgreSQL PostgreSQL | =8.3.13 | |
PostgreSQL PostgreSQL | =8.3.14 | |
PostgreSQL PostgreSQL | =8.3.15 | |
PostgreSQL PostgreSQL | =8.3.16 | |
PostgreSQL PostgreSQL | =8.3.17 | |
PostgreSQL PostgreSQL | =8.3.18 | |
PostgreSQL PostgreSQL | =8.3.19 | |
PostgreSQL PostgreSQL | =9.0 | |
PostgreSQL PostgreSQL | =9.0.1 | |
PostgreSQL PostgreSQL | =9.0.2 | |
PostgreSQL PostgreSQL | =9.0.3 | |
PostgreSQL PostgreSQL | =9.0.4 | |
PostgreSQL PostgreSQL | =9.0.5 | |
PostgreSQL PostgreSQL | =9.0.6 | |
PostgreSQL PostgreSQL | =9.0.7 | |
PostgreSQL PostgreSQL | =9.0.8 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.