Bug 1477185 (CVE-2017-7547) - CVE-2017-7547 postgresql: pg_user_mappings view discloses passwords to users lacking server privileges
Summary: CVE-2017-7547 postgresql: pg_user_mappings view discloses passwords to users ...
Status: NEW
Alias: CVE-2017-7547
Product: Security Response
Classification: Other
Component: vulnerability
Version: unspecified
Hardware: All
OS: Linux
medium
medium
Target Milestone: ---
Assignee: Red Hat Product Security
QA Contact:
URL:
Whiteboard: impact=moderate,public=20170810,repor...
Keywords: Security
Depends On: 1480282 1477696 1477697 1480283 1480284 1484638 1484639 1484640 1484641 1484642 1484643
Blocks: 1477189
TreeView+ depends on / blocked
 
Reported: 2017-08-01 12:29 UTC by Adam Mariš
Modified: 2019-01-02 22:43 UTC (History)
30 users (show)

(edit)
An authorization flaw was found in the way PostgreSQL handled access to the pg_user_mappings view on foreign servers. A remote, authenticated attacker could potentially use this flaw to retrieve passwords from the user mappings defined by the foreign server owners without actually having the privileges to do so.
Clone Of:
(edit)
Last Closed:


Attachments (Terms of Use)


External Trackers
Tracker ID Priority Status Summary Last Updated
Red Hat Product Errata RHSA-2017:2677 normal SHIPPED_LIVE Moderate: rh-postgresql95-postgresql security update 2017-09-12 12:00:23 UTC
Red Hat Product Errata RHSA-2017:2678 normal SHIPPED_LIVE Moderate: rh-postgresql94-postgresql security update 2017-09-12 14:02:27 UTC
Red Hat Product Errata RHSA-2017:2728 normal SHIPPED_LIVE Moderate: postgresql security update 2017-09-14 11:12:38 UTC

Description Adam Mariš 2017-08-01 12:29:56 UTC
The pg_user_mappings view long required privileges on a given foreign server in order to see "options", notably passwords, associated with user mappings of that server. The fix for CVE-2017-7486 removed that requirement. This allows each user to retrieve passwords from user mappings that foreign server owners defined for the user in question, even if that owner granted no actual privileges. The user in question might retrieve the password and use it to connect via another mechanism.

Supported vulnerable versions: 9.2 - 9.6

Upstream patch:

https://github.com/postgres/postgres/commit/b6e39ca92eeee4

Users affected by CVE-2017-7547 will need to perform additional steps after upgrading to resolve the issue. See https://www.postgresql.org/about/news/1772/ for more information on this.

Comment 1 Adam Mariš 2017-08-01 12:30:07 UTC
Acknowledgments:

Name: the PostgreSQL project
Upstream: Jeff Janes

Comment 4 Adam Mariš 2017-08-10 15:10:40 UTC
External References:

https://www.postgresql.org/about/news/1772/

Comment 5 Adam Mariš 2017-08-10 15:13:32 UTC
Created mingw-postgresql tracking bugs for this issue:

Affects: epel-7 [bug 1480282]
Affects: fedora-all [bug 1480283]


Created postgresql tracking bugs for this issue:

Affects: fedora-all [bug 1480284]

Comment 8 errata-xmlrpc 2017-09-12 08:01:34 UTC
This issue has been addressed in the following products:

  Red Hat Software Collections for Red Hat Enterprise Linux 6
  Red Hat Software Collections for Red Hat Enterprise Linux 6.7 EUS
  Red Hat Software Collections for Red Hat Enterprise Linux 7
  Red Hat Software Collections for Red Hat Enterprise Linux 7.3 EUS

Via RHSA-2017:2677 https://access.redhat.com/errata/RHSA-2017:2677

Comment 9 errata-xmlrpc 2017-09-12 10:03:51 UTC
This issue has been addressed in the following products:

  Red Hat Software Collections for Red Hat Enterprise Linux 6
  Red Hat Software Collections for Red Hat Enterprise Linux 6.7 EUS
  Red Hat Software Collections for Red Hat Enterprise Linux 7
  Red Hat Software Collections for Red Hat Enterprise Linux 7.3 EUS

Via RHSA-2017:2678 https://access.redhat.com/errata/RHSA-2017:2678

Comment 10 errata-xmlrpc 2017-09-14 07:13:35 UTC
This issue has been addressed in the following products:

  Red Hat Enterprise Linux 7

Via RHSA-2017:2728 https://access.redhat.com/errata/RHSA-2017:2728

Comment 11 Kurt Seifried 2017-12-18 22:07:36 UTC
Statement:

Red Hat Satellite 5 are is in Production 3 Phase of the support and maintenance life cycle. This has been rated as having Moderate security impact and is not currently planned to be addressed in future updates. For additional information, refer to the Red Hat Enterprise Linux Life Cycle: https://access.redhat.com/support/policy/updates/errata/.


Note You need to log in before you can comment on or make changes to this bug.