First published: Wed Sep 16 2020(Updated: )
The Windows installer for PostgreSQL 9.5 - 12 invokes system-provided executables that do not have fully-qualified paths. Executables in the directory where the installer loads or the current working directory take precedence over the intended executables. An attacker having permission to add files into one of those directories can use this to execute arbitrary code with the installer's administrative rights.
Credit: secalert@redhat.com
Affected Software | Affected Version | How to fix |
---|---|---|
PostgreSQL PostgreSQL | >=9.5<9.5.22 | |
PostgreSQL PostgreSQL | >=9.6<9.6.18 | |
PostgreSQL PostgreSQL | >=10.0<10.13 | |
PostgreSQL PostgreSQL | >=11.0<11.8 | |
PostgreSQL PostgreSQL | >=12.0<12.3 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The vulnerability ID for this PostgreSQL installer vulnerability is CVE-2020-10733.
CVE-2020-10733 has a severity level of 7.3 (High).
PostgreSQL versions 9.5 to 12 are affected by CVE-2020-10733.
The vulnerability in the PostgreSQL installer occurs when system-provided executables are invoked without fully-qualified paths, allowing an attacker to potentially execute arbitrary code.
Yes, patches and updates are available to address the vulnerability. It is recommended to update to the latest version of PostgreSQL to mitigate the risk.