postgresql before versions 11.1, 10.6 is vulnerable to a to SQL injection in pg_upgrade and pg_dump via CREATE TRIGGER ... REFERENCING. Using a purpose-crafted trigger definition, an attacker can cause arbitrary SQL statements to run, with superuser privileges.
References
Link | Resource |
---|---|
http://www.securityfocus.com/bid/105923 | Third Party Advisory VDB Entry |
http://www.securitytracker.com/id/1042144 | Third Party Advisory VDB Entry |
https://access.redhat.com/errata/RHSA-2018:3757 | Third Party Advisory |
https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2018-16850 | Issue Tracking Patch Third Party Advisory |
https://security.gentoo.org/glsa/201811-24 | Mitigation Third Party Advisory |
https://usn.ubuntu.com/3818-1/ | Third Party Advisory |
https://www.postgresql.org/about/news/1905/ | Release Notes Vendor Advisory |
Configurations
Configuration 1 (hide)
|
Configuration 2 (hide)
|
Configuration 3 (hide)
|
History
No history.
Information
Published : 2018-11-13 15:29
Updated : 2024-02-28 16:48
NVD link : CVE-2018-16850
Mitre link : CVE-2018-16850
CVE.ORG link : CVE-2018-16850
JSON object : View
Products Affected
canonical
- ubuntu_linux
redhat
- enterprise_linux
postgresql
- postgresql
CWE
CWE-89
Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')