The Windows installer for PostgreSQL invokes system-provided executables that do not have fully-qualified paths. Executables in the directory where the installer loads or the current working directory take precedence over the intended executables. An attacker having permission to add files into one of those directories can use this to execute arbitrary code with the installer's administrative rights.
The PostgreSQL project thanks Hou JingYi (@hjy79425575) for reporting this problem.
Affected Version | Fixed In | Fix Published |
---|---|---|
12 | 12.3 | May 14, 2020 |
11 | 11.8 | May 14, 2020 |
10 | 10.13 | May 14, 2020 |
9.6 | 9.6.18 | May 14, 2020 |
9.5 | 9.5.22 | May 14, 2020 |
For more information about PostgreSQL versioning, please visit the versioning page.
Overall Score | 6.7 |
---|---|
Component | packaging |
Vector | AV:L/AC:H/PR:L/UI:R/S:U/C:H/I:H/A:H |
If you wish to report a new security vulnerability in PostgreSQL, please send an email to security@postgresql.org.
For reporting non-security bugs, please see the Report a Bug page.