The PostgreSQL search_path
setting determines schemas searched for tables,
functions, operators, etc. The CVE-2018-1058 fix caused most PostgreSQL-provided client applications to sanitize search_path
, but logical replication continued to leave search_path
unchanged. Users of a replication publisher or subscriber database can create objects in the public
schema and harness them to execute arbitrary SQL functions under the identity running replication, often a superuser. Installations having adopted a documented secure schema usage pattern are not vulnerable.
The PostgreSQL project thanks Noah Misch for reporting this problem.
Affected Version | Fixed In | Fix Published |
---|---|---|
12 | 12.4 | Aug. 13, 2020 |
11 | 11.9 | Aug. 13, 2020 |
10 | 10.14 | Aug. 13, 2020 |
For more information about PostgreSQL versioning, please visit the versioning page.
Overall Score | 7.5 |
---|---|
Component | core server |
Vector | AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H |
If you wish to report a new security vulnerability in PostgreSQL, please send an email to [email protected].
For reporting non-security bugs, please see the Report a Bug page.