A flaw was found in PostgreSQL versions before 13.1, before 12.5, before 11.10, before 10.15, before 9.6.20 and before 9.5.24. An attacker having permission to create non-temporary objects in at least one schema can execute arbitrary SQL functions under the identity of a superuser. The highest threat from this vulnerability is to data confidentiality and integrity as well as system availability.
References
Link | Resource |
---|---|
https://www.postgresql.org/support/security/ | Vendor Advisory |
https://bugzilla.redhat.com/show_bug.cgi?id=1894425 | Issue Tracking Third Party Advisory |
https://security.netapp.com/advisory/ntap-20201202-0003/ | Third Party Advisory |
https://lists.debian.org/debian-lts-announce/2020/12/msg00005.html | Mailing List Third Party Advisory |
https://security.gentoo.org/glsa/202012-07 | Third Party Advisory |
Configurations
Configuration 1 (hide)
|
Configuration 2 (hide)
|
Information
Published : 2020-11-15 17:15
Updated : 2022-10-19 08:01
NVD link : CVE-2020-25695
Mitre link : CVE-2020-25695
JSON object : View
CWE
CWE-89
Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')
Products Affected
debian
- debian_linux
postgresql
- postgresql