In the pg_partman (aka PG Partition Manager) extension before 4.5.1 for PostgreSQL, arbitrary code execution can be achieved via SECURITY DEFINER functions because an explicit search_path is not set.
References
Link | Resource |
---|---|
https://github.com/pgpartman/pg_partman/compare/v4.5.0...v4.5.1 | Patch Third Party Advisory |
https://github.com/pgpartman/pg_partman/commit/0b6565ad378c358f8a6cd1d48ddc482eb7f854d3 | Patch Third Party Advisory |
https://security.netapp.com/advisory/ntap-20210625-0006/ | Third Party Advisory |
Configurations
Information
Published : 2021-05-19 10:15
Updated : 2021-09-07 15:01
NVD link : CVE-2021-33204
Mitre link : CVE-2021-33204
JSON object : View
CWE
CWE-77
Improper Neutralization of Special Elements used in a Command ('Command Injection')
Products Affected
pgxn
- pg_partman