First published: Tue Aug 04 2020(Updated: )
A flaw was found in PostgreSQL, where it did not properly sanitize the search_path during logical replication. This flaw allows an authenticated attacker to use this flaw in an attack similar to CVE-2018-1058 to execute an arbitrary SQL command in the user's context for replication. The highest threat from this vulnerability is to confidentiality, integrity, as well as system availability.
Credit: secalert@redhat.com secalert@redhat.com
Affected Software | Affected Version | How to fix |
---|---|---|
redhat/rh-postgresql10-postgresql | <0:10.14-1.el7 | 0:10.14-1.el7 |
redhat/rh-postgresql12-postgresql | <0:12.4-1.el7 | 0:12.4-1.el7 |
redhat/rhvm-appliance | <0:4.4-20210310.0.el8e | 0:4.4-20210310.0.el8e |
redhat/postgresql | <12.4 | 12.4 |
redhat/postgresql | <11.9 | 11.9 |
redhat/postgresql | <10.14 | 10.14 |
PostgreSQL PostgreSQL | >=10.0<10.14 | |
PostgreSQL PostgreSQL | >=11.0<11.9 | |
PostgreSQL PostgreSQL | >=12.0<12.4 | |
openSUSE Leap | =15.1 | |
openSUSE Leap | =15.2 | |
debian/postgresql-11 | ||
debian/postgresql-12 | ||
debian/postgresql-9.6 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
(Appears in the following advisories)
CVE-2020-14349 is a vulnerability that affects PostgreSQL versions before 12.4, before 11.9, and before 10.14. It allows an authenticated attacker to execute arbitrary SQL commands in the user's context for replication.
CVE-2020-14349 impacts PostgreSQL by not properly sanitizing the search_path during logical replication, which allows an attacker to execute arbitrary SQL commands in the user's context for replication.
CVE-2020-14349 has a severity value of 7 (high).
CVE-2020-14349 affects versions before 12.4, before 11.9, and before 10.14 of PostgreSQL.
To fix the CVE-2020-14349 vulnerability, you should update PostgreSQL to version 12.4, version 11.9, or version 10.14.