First published: Tue Feb 02 2021(Updated: )
PostgreSQL could allow a remote authenticated attacker to obtain sensitive information, caused by a flaw in the error messages. By sending a specially-crafted query, an attacker could exploit this vulnerability to obtain sensitive information from a column they have UPDATE permission but not SELECT permission to, and use this information to launch further attacks against the affected system.
Credit: secalert@redhat.com
Affected Software | Affected Version | How to fix |
---|---|---|
redhat/postgresql | <13.2 | 13.2 |
redhat/postgresql | <12.6 | 12.6 |
redhat/postgresql | <11.11 | 11.11 |
IBM Security Verify Access | <=10.0.0 | |
PostgreSQL PostgreSQL | <11.11 | |
PostgreSQL PostgreSQL | >=12.0<12.6 | |
PostgreSQL PostgreSQL | >=13.0<13.2 | |
Redhat Software Collections | ||
Red Hat Enterprise Linux | =8.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2021-3393 is an information leak vulnerability in PostgreSQL versions before 13.2, before 12.6, and before 11.11.
A remote authenticated attacker can exploit CVE-2021-3393 by crafting queries that may disclose values from a specific column in error messages.
CVE-2021-3393 has a severity rating of 4.3, which is considered medium.
Versions before 13.2, before 12.6, and before 11.11 of PostgreSQL are affected by CVE-2021-3393.
You can find more information about CVE-2021-3393 at the following references: [Reference 1](https://access.redhat.com/security/cve/CVE-2014-8161), [Reference 2](https://bugzilla.redhat.com/show_bug.cgi?id=1927868), [Reference 3](https://bugzilla.redhat.com/show_bug.cgi?id=1927867).