CVE-2023-39417

high

Description

IN THE EXTENSION SCRIPT, a SQL Injection vulnerability was found in PostgreSQL if it uses @extowner@, @extschema@, or @extschema:...@ inside a quoting construct (dollar quoting, '', or ""). If an administrator has installed files of a vulnerable, trusted, non-bundled extension, an attacker with database-level CREATE privilege can execute arbitrary code as the bootstrap superuser.

References

https://www.postgresql.org/support/security/CVE-2023-39417

https://bugzilla.redhat.com/show_bug.cgi?id=2228111

https://access.redhat.com/security/cve/CVE-2023-39417

https://access.redhat.com/errata/RHSA-2024:0337

https://access.redhat.com/errata/RHSA-2024:0332

https://access.redhat.com/errata/RHSA-2024:0304

https://access.redhat.com/errata/RHSA-2023:7885

https://access.redhat.com/errata/RHSA-2023:7884

https://access.redhat.com/errata/RHSA-2023:7883

https://access.redhat.com/errata/RHSA-2023:7785

https://access.redhat.com/errata/RHSA-2023:7784

https://access.redhat.com/errata/RHSA-2023:7772

https://access.redhat.com/errata/RHSA-2023:7770

https://access.redhat.com/errata/RHSA-2023:7714

https://access.redhat.com/errata/RHSA-2023:7695

https://access.redhat.com/errata/RHSA-2023:7694

https://access.redhat.com/errata/RHSA-2023:7667

https://access.redhat.com/errata/RHSA-2023:7666

https://access.redhat.com/errata/RHSA-2023:7656

https://access.redhat.com/errata/RHSA-2023:7616

https://access.redhat.com/errata/RHSA-2023:7581

https://access.redhat.com/errata/RHSA-2023:7580

https://access.redhat.com/errata/RHSA-2023:7579

https://access.redhat.com/errata/RHSA-2023:7545

Details

Source: Mitre, NVD

Published: 2023-08-11

Updated: 2024-09-09

Risk Information

CVSS v2

Base Score: 9

Vector: CVSS2#AV:N/AC:L/Au:S/C:C/I:C/A:C

Severity: High

CVSS v3

Base Score: 8.8

Vector: CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H

Severity: High