Bug 1448089 (CVE-2017-7486)

Summary: CVE-2017-7486 postgresql: pg_user_mappings view discloses foreign server passwords
Product: [Other] Security Response Reporter: Adam Mariš <amaris>
Component: vulnerabilityAssignee: Red Hat Product Security <security-response-team>
Status: CLOSED ERRATA QA Contact:
Severity: medium Docs Contact:
Priority: medium    
Version: unspecifiedCC: bkearney, cpelland, dajohnso, databases-maint, devrim, gblomqui, gmccullo, gtanzill, hhorak, hhudgeon, jfrey, jhardy, jmlich83, jorton, jprause, jstanek, meissner, mike, obarenbo, pkubat, praiskup, roliveri, security-response-team, simaishi, tgl, thomas, tlestach
Target Milestone: ---Keywords: Security
Target Release: ---   
Hardware: All   
OS: Linux   
Whiteboard:
Fixed In Version: postgresql 9.2.21, postgresql 9.3.17, postgresql 9.4.12, postgresql 9.5.7, postgresql 9.6.3 Doc Type: If docs needed, set a value
Doc Text:
It was found that the pg_user_mappings view could disclose information about user mappings to a foreign database to non-administrative database users. A database user with USAGE privilege for this mapping could, when querying the view, obtain user mapping data, such as the username and password used to connect to the foreign database.
Story Points: ---
Clone Of: Environment:
Last Closed: 2019-06-08 03:11:57 UTC Type: ---
Regression: --- Mount Type: ---
Documentation: --- CRM:
Verified Versions: Category: ---
oVirt Team: --- RHEL 7.3 requirements from Atomic Host:
Cloudforms Team: --- Target Upstream Version:
Embargoed:
Bug Depends On: 1449699, 1449700, 1449701, 1449702, 1449703, 1449704, 1449705, 1449706, 1450115, 1450116, 1450117, 1469544, 1469545    
Bug Blocks: 1415638, 1448091    

Description Adam Mariš 2017-05-04 13:52:54 UTC
A typical CREATE USER MAPPING command persists a foreign password in an "option" of the user mapping. Contrary to its documentation and at variance with the information_schema.user_mapping_options view, the pg_user_mappings view discloses user mapping options to any user having USAGE privilege on the associated foreign server. If someone revokes the USAGE grant, an attacker having captured the password this way might use it to connect another way. An attacker may use the password to run arbitrary queries against the server or others accepting the same credentials, not just the limited queries one can issue via foreign tables.

Affected versions: 8.4 - 9.6

Comment 1 Adam Mariš 2017-05-04 13:53:13 UTC
Acknowledgments:

Name: the PostgreSQL project
Upstream: Andrew Wheelwright

Comment 2 Cedric Buissart 2017-05-09 12:10:42 UTC
Upstream patch : 
 * Match pg_user_mappings limits to information_schema.user_mapping_options
https://github.com/postgres/postgres/commit/3eefc51053f

Comment 4 Adam Mariš 2017-05-11 14:38:56 UTC
External References:

https://www.postgresql.org/about/news/1746/

Comment 5 Adam Mariš 2017-05-11 14:47:36 UTC
Created mingw-postgresql tracking bugs for this issue:

Affects: epel-7 [bug 1450116]
Affects: fedora-all [bug 1450117]


Created postgresql tracking bugs for this issue:

Affects: fedora-all [bug 1450115]

Comment 8 errata-xmlrpc 2017-07-05 05:45:38 UTC
This issue has been addressed in the following products:

  Red Hat Software Collections for Red Hat Enterprise Linux 6
  Red Hat Software Collections for Red Hat Enterprise Linux 6.7 EUS
  Red Hat Software Collections for Red Hat Enterprise Linux 7
  Red Hat Software Collections for Red Hat Enterprise Linux 7.3 EUS

Via RHSA-2017:1677 https://access.redhat.com/errata/RHSA-2017:1677

Comment 9 errata-xmlrpc 2017-07-05 05:55:38 UTC
This issue has been addressed in the following products:

  Red Hat Software Collections for Red Hat Enterprise Linux 6
  Red Hat Software Collections for Red Hat Enterprise Linux 6.7 EUS
  Red Hat Software Collections for Red Hat Enterprise Linux 7
  Red Hat Software Collections for Red Hat Enterprise Linux 7.3 EUS

Via RHSA-2017:1678 https://access.redhat.com/errata/RHSA-2017:1678

Comment 11 errata-xmlrpc 2017-07-31 15:53:09 UTC
This issue has been addressed in the following products:

  Red Hat Satellite 5.8
  Red Hat Satellite 5.8 ELS

Via RHSA-2017:1838 https://access.redhat.com/errata/RHSA-2017:1838

Comment 12 errata-xmlrpc 2017-08-01 20:45:41 UTC
This issue has been addressed in the following products:

  Red Hat Enterprise Linux 7

Via RHSA-2017:1983 https://access.redhat.com/errata/RHSA-2017:1983

Comment 13 errata-xmlrpc 2017-08-07 16:13:12 UTC
This issue has been addressed in the following products:

  Red Hat Satellite 5.7

Via RHSA-2017:2425 https://access.redhat.com/errata/RHSA-2017:2425