Incorrect control of environment variables in PostgreSQL
PL/Perl allows an
unprivileged database user to change sensitive process environment variables
(e.g. PATH
). That often suffices to enable arbitrary code execution, even if
the attacker lacks a database server operating system user. Versions before
PostgreSQL 17.1, 16.5, 15.9, 14.14, 13.17, and 12.21 are affected.
The PostgreSQL project thanks Coby Abrams for reporting this problem.
Affected Version | Fixed In | Fix Published |
---|---|---|
17 | 17.1 | Nov. 14, 2024 |
16 | 16.5 | Nov. 14, 2024 |
15 | 15.9 | Nov. 14, 2024 |
14 | 14.14 | Nov. 14, 2024 |
13 | 13.17 | Nov. 14, 2024 |
12 | 12.21 | Nov. 14, 2024 |
For more information about PostgreSQL versioning, please visit the versioning page.
Overall Score | 8.8 |
---|---|
Component | core server |
Vector | AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H |
If you wish to report a new security vulnerability in PostgreSQL, please send an email to security@postgresql.org.
For reporting non-security bugs, please see the Report a Bug page.