First published: Fri Mar 08 2024(Updated: )
PostgreSQL Anonymizer v1.2 contains a vulnerability that allows a user who owns a table to elevate to superuser. A user can define a masking function for a column and place malicious code in that function. When a privileged user applies the masking rules using the static masking or the anonymous dump method, the malicious code is executed and can grant escalated privileges to the malicious user. PostgreSQL Anonymizer v1.2 does provide a protection against this risk with the restrict_to_trusted_schemas option, but that protection is incomplete. Users that don't own a table, especially masked users cannot exploit this vulnerability. The problem is resolved in v1.3.
Credit: f86ef6dc-4d3a-42ad-8f28-e6d5547a5007
Affected Software | Affected Version | How to fix |
---|---|---|
PostgreSQL Anonymizer | =1.2 | |
Dalibo Anonymizer Postgresql | =1.2.0 |
https://gitlab.com/dalibo/postgresql_anonymizer/-/commit/e517b38e62e50871b04011598e73a7308bdae9d9
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2024-2339 has a high severity rating due to its potential to allow unauthorized elevation of privileges.
To fix CVE-2024-2339, update PostgreSQL Anonymizer to a version that addresses this vulnerability.
CVE-2024-2339 affects users of PostgreSQL Anonymizer version 1.2 who have ownership of tables.
CVE-2024-2339 is a privilege escalation vulnerability that allows users to gain superuser access.
Attackers can exploit CVE-2024-2339 to execute malicious code through masking functions, potentially compromising the database.