Bug 1865746 (CVE-2020-14350) - CVE-2020-14350 postgresql: Uncontrolled search path element in CREATE EXTENSION
Summary: CVE-2020-14350 postgresql: Uncontrolled search path element in CREATE EXTENSION
Keywords:
Status: CLOSED ERRATA
Alias: CVE-2020-14350
Product: Security Response
Classification: Other
Component: vulnerability
Version: unspecified
Hardware: All
OS: Linux
medium
medium
Target Milestone: ---
Assignee: Red Hat Product Security
QA Contact:
URL:
Whiteboard:
Depends On: 1867108 1867109 1867110 1867111 1867112 1867114 1867514 1868664 1868666 1868668 1868669 1868670 1877201 1881773 1881780 1867113 1867513 1872154
Blocks: 1865747
TreeView+ depends on / blocked
 
Reported: 2020-08-04 03:51 UTC by Dhananjay Arunesh
Modified: 2020-09-23 04:27 UTC (History)
90 users (show)

Fixed In Version: postgresql 12.4, postgresql 11.9, postgresql 10.14, postgresql 9.6.19, postgresql and 9.5.23
Doc Type: If docs needed, set a value
Doc Text:
It was found that some PostgreSQL extensions did not use search_path safely in their installation script. An attacker with sufficient privileges could use this flaw to trick an administrator into executing a specially crafted script, during the installation or update of such extension.
Clone Of:
Environment:
Last Closed: 2020-09-08 13:19:37 UTC


Attachments (Terms of Use)


Links
System ID Priority Status Summary Last Updated
Red Hat Product Errata RHSA-2020:3669 None None None 2020-09-08 09:49:56 UTC

Description Dhananjay Arunesh 2020-08-04 03:51:47 UTC
When a superuser issues certain CREATE EXTENSION statements, users may be able to execute arbitrary SQL functions under the identity of that superuser.  The attacker must have permission to create objects in the new extension's schema or a schema of a prerequisite extension.  Not all extensions are vulnerable. In addition to correcting the extensions provided with PostgreSQL, the project is issuing guidance for third-party extension authors to secure their own work.

Comment 7 Marian Rehak 2020-08-13 12:30:10 UTC
Created postgresql tracking bugs for this issue:

Affects: fedora-all [bug 1868670]


Created postgresql:10/postgresql tracking bugs for this issue:

Affects: fedora-all [bug 1868666]


Created postgresql:11/postgresql tracking bugs for this issue:

Affects: fedora-all [bug 1868668]


Created postgresql:12/postgresql tracking bugs for this issue:

Affects: fedora-all [bug 1868669]


Created postgresql:9.6/postgresql tracking bugs for this issue:

Affects: fedora-all [bug 1868664]

Comment 10 Hardik Vyas 2020-09-08 08:08:11 UTC
Statement:

In Red Hat Gluster Storage 3, PostgreSQL was shipped as a part of Red Hat Gluster Storage Console that is no longer supported for use with Red Hat Gluster Storage 3.5. Red Hat Gluster Storage Web Administration is now the recommended monitoring tool for Red Hat Storage Gluster clusters.

Comment 11 errata-xmlrpc 2020-09-08 09:49:50 UTC
This issue has been addressed in the following products:

  Red Hat Enterprise Linux 8

Via RHSA-2020:3669 https://access.redhat.com/errata/RHSA-2020:3669

Comment 12 Product Security DevOps Team 2020-09-08 13:19:37 UTC
This bug is now closed. Further updates for individual products will be reflected on the CVE page(s):

https://access.redhat.com/security/cve/cve-2020-14350


Note You need to log in before you can comment on or make changes to this bug.