In PostgreSQL 9.3 through 11.2, the "COPY TO/FROM PROGRAM" function allows superusers and users in the 'pg_execute_server_program' group to execute arbitrary code in the context of the database's operating system user. This functionality is enabled by default and can be abused to run arbitrary operating system commands on Windows, Linux, and macOS. NOTE: Third parties claim/state this is not an issue because PostgreSQL functionality for ‘COPY TO/FROM PROGRAM’ is acting as intended. References state that in PostgreSQL, a superuser can execute commands as the server user without using the ‘COPY FROM PROGRAM’.
References
Configurations
History
21 Nov 2024, 04:51
Type | Values Removed | Values Added |
---|---|---|
References | () http://packetstormsecurity.com/files/152757/PostgreSQL-COPY-FROM-PROGRAM-Command-Execution.html - Third Party Advisory | |
References | () http://packetstormsecurity.com/files/166540/PostgreSQL-11.7-Remote-Code-Execution.html - | |
References | () http://packetstormsecurity.com/files/171722/PostgreSQL-9.6.1-Remote-Code-Execution.html - | |
References | () https://blog.hagander.net/when-a-vulnerability-is-not-a-vulnerability-244/ - Third Party Advisory | |
References | () https://medium.com/greenwolf-security/authenticated-arbitrary-command-execution-on-postgresql-9-3-latest-cd18945914d5 - Exploit, Third Party Advisory | |
References | () https://paquier.xyz/postgresql-2/postgres-9-3-feature-highlight-copy-tofrom-program/ - Third Party Advisory | |
References | () https://security.netapp.com/advisory/ntap-20190502-0003/ - Third Party Advisory | |
References | () https://www.trustwave.com/en-us/resources/blogs/spiderlabs-blog/authenticated-arbitrary-command-execution-on-postgresql-9-3/ - Third Party Advisory |
07 Nov 2023, 03:13
Type | Values Removed | Values Added |
---|---|---|
Summary | In PostgreSQL 9.3 through 11.2, the "COPY TO/FROM PROGRAM" function allows superusers and users in the 'pg_execute_server_program' group to execute arbitrary code in the context of the database's operating system user. This functionality is enabled by default and can be abused to run arbitrary operating system commands on Windows, Linux, and macOS. NOTE: Third parties claim/state this is not an issue because PostgreSQL functionality for ‘COPY TO/FROM PROGRAM’ is acting as intended. References state that in PostgreSQL, a superuser can execute commands as the server user without using the ‘COPY FROM PROGRAM’. |
Information
Published : 2019-04-01 21:30
Updated : 2024-11-21 04:51
NVD link : CVE-2019-9193
Mitre link : CVE-2019-9193
CVE.ORG link : CVE-2019-9193
JSON object : View
Products Affected
postgresql
- postgresql
CWE
CWE-78
Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')