First published: Tue Aug 01 2023(Updated: )
An extension script is vulnerable if it uses @extowner@, @extschema@, or @extschema:...@ inside a quoting construct (dollar quoting, '', or ""). No bundled extension is vulnerable. Vulnerable uses do appear in a documentation example and in non-bundled extensions. Hence, the attack prerequisite is an administrator having installed files of a vulnerable, trusted, non-bundled extension. Subject to that prerequisite, this enables an attacker having database-level CREATE privilege to execute arbitrary code as the bootstrap superuser. PostgreSQL will block this attack in the core server, so there's no need to modify individual extensions. Supported, Vulnerable Versions: 11 - 15.
Credit: secalert@redhat.com secalert@redhat.com secalert@redhat.com
Affected Software | Affected Version | How to fix |
---|---|---|
PostgreSQL PostgreSQL | >=11.0<11.21 | |
PostgreSQL PostgreSQL | >=12.0<12.16 | |
PostgreSQL PostgreSQL | >=13.0<13.12 | |
PostgreSQL PostgreSQL | >=14.0<14.9 | |
PostgreSQL PostgreSQL | >=15.0<15.4 | |
Redhat Software Collections | ||
Redhat Enterprise Linux | =8.0 | |
Redhat Enterprise Linux | =9.0 | |
Debian Debian Linux | =8.0 | |
Debian Debian Linux | =11.0 | |
Debian Debian Linux | =12.0 | |
redhat/postgresql | <11.21 | 11.21 |
redhat/postgresql | <12.16 | 12.16 |
redhat/postgresql | <13.12 | 13.12 |
redhat/postgresql | <14.9 | 14.9 |
redhat/postgresql | <15.4 | 15.4 |
debian/postgresql-13 | 13.16-0+deb11u1 | |
debian/postgresql-15 | 15.8-0+deb12u1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The vulnerability ID is CVE-2023-39417.
The severity of CVE-2023-39417 is high.
PostgreSQL versions 11.0 to 15.4 are affected by CVE-2023-39417.
The SQL Injection vulnerability occurs when PostgreSQL uses @extowner@, @extschema@, or @extschema:...@ inside a quoting construct (dollar quoting, '', or ").
Yes, there are remedies available for CVE-2023-39417. Please refer to the official sources for more information.