Re: Dissecting PostgreSQL CVE-2013-1899 (blackwinghq.com)

From: Bruce Momjian <bruce(at)momjian(dot)us>
To: Thom Brown <thom(at)linux(dot)com>
Cc: Selena Deckelmann <selena(at)chesnok(dot)com>, Robert Bernier <robert(at)pg-live(dot)info>, PostgreSQL Advocacy <pgsql-advocacy(at)postgresql(dot)org>
Subject: Re: Dissecting PostgreSQL CVE-2013-1899 (blackwinghq.com)
Date: 2013-04-11 19:12:44
Message-ID: 20130411191244.GF6028@momjian.us
Views: Raw Message | Whole Thread | Download mbox | Resend email
Thread:
Lists: pgsql-advocacy

On Thu, Apr 11, 2013 at 06:24:54PM +0100, Thom Brown wrote:
> On 11 April 2013 18:15, Selena Deckelmann <selena(at)chesnok(dot)com> wrote:
> >
> >
> >
> > On Thu, Apr 11, 2013 at 8:05 AM, Bruce Momjian <bruce(at)momjian(dot)us> wrote:
> >>
> >> On Thu, Apr 11, 2013 at 07:51:01AM -0700, Robert Bernier wrote:
> >> > Comments?
> >> >
> >> > http://blog.blackwinghq.com/2013/04/08/2/
> >>
> >> It is interesting how they try to combine the write ability to a web
> >> server or postgres .profile file; I find the .profile particularly
> >> nasty.
> >
> >
> > Yup. It's maybe an argument for chroot'ing the server to the $PGDATA
> > directory. I realize that's probably not reasonable for stuff like
> > extensions right now.
> >
> > Also, a related best practice is keeping track of all the files that are in
> > home directories of privileged users with something like Puppet or Chef --
> > so even if an attacker *does* overwrite a file like this, automation will
> > wipe it out.
>
> Couldn't you deny write-access to .profile to the postgres user?

You could, but they could create .bashrc, .bash_profile, or
.bash_logout, which would cause the same problem.

--
Bruce Momjian <bruce(at)momjian(dot)us> http://momjian.us
EnterpriseDB http://enterprisedb.com

+ It's impossible for everything to be true. +

In response to

Browse pgsql-advocacy by date

  From Date Subject
Next Message Josh Berkus 2013-04-11 23:38:20 Re: Dissecting PostgreSQL CVE-2013-1899 (blackwinghq.com)
Previous Message Thom Brown 2013-04-11 17:24:54 Re: Dissecting PostgreSQL CVE-2013-1899 (blackwinghq.com)