postgresql before versions 11.1, 10.6 is vulnerable to a to SQL injection in pg_upgrade and pg_dump via CREATE TRIGGER ... REFERENCING. Using a purpose-crafted trigger definition, an attacker can cause arbitrary SQL statements to run, with superuser privileges.
References
Link | Resource |
---|---|
https://www.postgresql.org/about/news/1905/ | Release Notes Vendor Advisory |
https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2018-16850 | Issue Tracking Patch Third Party Advisory |
https://usn.ubuntu.com/3818-1/ | Third Party Advisory |
http://www.securitytracker.com/id/1042144 | Third Party Advisory VDB Entry |
http://www.securityfocus.com/bid/105923 | Third Party Advisory VDB Entry |
https://security.gentoo.org/glsa/201811-24 | Mitigation Third Party Advisory |
https://access.redhat.com/errata/RHSA-2018:3757 | Third Party Advisory |
Configurations
Configuration 1 (hide)
|
Configuration 2 (hide)
|
Configuration 3 (hide)
|
Information
Published : 2018-11-13 07:29
Updated : 2023-01-19 12:11
NVD link : CVE-2018-16850
Mitre link : CVE-2018-16850
JSON object : View
CWE
CWE-89
Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')
Products Affected
canonical
- ubuntu_linux
postgresql
- postgresql
redhat
- enterprise_linux