|Title:||PostgreSQL 10.x < 10.14, 11.x < 11.9, 12.x < 12.4 Search Path Vulnerability (Linux)|
|Summary:||PostgreSQL is prone to an uncontrolled search path element vulnerability in; logical replication.|
PostgreSQL is prone to an uncontrolled search path element vulnerability in
The PostgreSQL search_path setting determines schemas searched for tables,
functions, operators, etc. The CVE-2018-1058 fix caused most PostgreSQL-provided client applications to sanitize
search_path, but logical replication continued to leave search_path unchanged. Users of a replication publisher
or subscriber database can create objects in the public schema and harness them to execute arbitrary SQL
functions under the identity running replication, often a superuser. Installations having adopted a documented
secure schema usage pattern are not vulnerable.
PostgreSQL versions 10.x prior to 10.14, 11.x prior to 11.9 and 12.x
prior to 12.4.
Update to version 10.14, 11.9, 12.4 or later.
Common Vulnerability Exposure (CVE) ID: CVE-2020-14349|
|Copyright||Copyright (C) 2020 Greenbone Networks GmbH|
|This is only one of 86218 vulnerability tests in our test suite. Find out more about running a complete security audit.|
To run a free test of this vulnerability against your system, register below.