First published: Fri Mar 08 2024(Updated: )
PostgreSQL Anonymizer v1.2 contains a SQL injection vulnerability that allows a user who owns a table to elevate to superuser when dynamic masking is enabled. PostgreSQL Anonymizer enables users to set security labels on tables to mask specified columns. There is a flaw that allows complex expressions to be provided as a value. This expression is then later used as it to create the masked views leading to SQL Injection. If dynamic masking is enabled, this will lead to privilege escalation to superuser after the label is created. Users that don't own a table, especially masked users cannot exploit this vulnerability. The problem is resolved in v1.3.
Credit: f86ef6dc-4d3a-42ad-8f28-e6d5547a5007
Affected Software | Affected Version | How to fix |
---|---|---|
PostgreSQL Anonymizer | =1.2 | |
Dalibo Anonymizer Postgresql | =1.2.0 |
https://gitlab.com/dalibo/postgresql_anonymizer/-/commit/f55daadba3fa8226029687964aa8889d01a79778
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2024-2338 is classified as a high severity SQL injection vulnerability.
To mitigate CVE-2024-2338, upgrade PostgreSQL Anonymizer to version 1.3 or later.
Users of PostgreSQL Anonymizer version 1.2 are affected by CVE-2024-2338.
CVE-2024-2338 is a SQL injection vulnerability that allows potential superuser elevation.
An attacker can exploit CVE-2024-2338 to elevate their privileges to superuser when dynamic masking is enabled.