CVE-2019-9193

In PostgreSQL 9.3 through 11.2, the "COPY TO/FROM PROGRAM" function allows superusers and users in the 'pg_execute_server_program' group to execute arbitrary code in the context of the database's operating system user. This functionality is enabled by default and can be abused to run arbitrary operating system commands on Windows, Linux, and macOS. NOTE: Third parties claim/state this is not an issue because PostgreSQL functionality for ‘COPY TO/FROM PROGRAM’ is acting as intended. References state that in PostgreSQL, a superuser can execute commands as the server user without using the ‘COPY FROM PROGRAM’.
References
Link Resource
http://packetstormsecurity.com/files/152757/PostgreSQL-COPY-FROM-PROGRAM-Command-Execution.html Third Party Advisory
http://packetstormsecurity.com/files/166540/PostgreSQL-11.7-Remote-Code-Execution.html
http://packetstormsecurity.com/files/171722/PostgreSQL-9.6.1-Remote-Code-Execution.html
https://blog.hagander.net/when-a-vulnerability-is-not-a-vulnerability-244/ Third Party Advisory
https://medium.com/greenwolf-security/authenticated-arbitrary-command-execution-on-postgresql-9-3-latest-cd18945914d5 Exploit Third Party Advisory
https://paquier.xyz/postgresql-2/postgres-9-3-feature-highlight-copy-tofrom-program/ Third Party Advisory
https://security.netapp.com/advisory/ntap-20190502-0003/ Third Party Advisory
https://www.trustwave.com/en-us/resources/blogs/spiderlabs-blog/authenticated-arbitrary-command-execution-on-postgresql-9-3/ Third Party Advisory
http://packetstormsecurity.com/files/152757/PostgreSQL-COPY-FROM-PROGRAM-Command-Execution.html Third Party Advisory
http://packetstormsecurity.com/files/166540/PostgreSQL-11.7-Remote-Code-Execution.html
http://packetstormsecurity.com/files/171722/PostgreSQL-9.6.1-Remote-Code-Execution.html
https://blog.hagander.net/when-a-vulnerability-is-not-a-vulnerability-244/ Third Party Advisory
https://medium.com/greenwolf-security/authenticated-arbitrary-command-execution-on-postgresql-9-3-latest-cd18945914d5 Exploit Third Party Advisory
https://paquier.xyz/postgresql-2/postgres-9-3-feature-highlight-copy-tofrom-program/ Third Party Advisory
https://security.netapp.com/advisory/ntap-20190502-0003/ Third Party Advisory
https://www.trustwave.com/en-us/resources/blogs/spiderlabs-blog/authenticated-arbitrary-command-execution-on-postgresql-9-3/ Third Party Advisory
Configurations

Configuration 1 (hide)

cpe:2.3:a:postgresql:postgresql:*:*:*:*:*:*:*:*

History

21 Nov 2024, 04:51

Type Values Removed Values Added
References () http://packetstormsecurity.com/files/152757/PostgreSQL-COPY-FROM-PROGRAM-Command-Execution.html - Third Party Advisory () http://packetstormsecurity.com/files/152757/PostgreSQL-COPY-FROM-PROGRAM-Command-Execution.html - Third Party Advisory
References () http://packetstormsecurity.com/files/166540/PostgreSQL-11.7-Remote-Code-Execution.html - () http://packetstormsecurity.com/files/166540/PostgreSQL-11.7-Remote-Code-Execution.html -
References () http://packetstormsecurity.com/files/171722/PostgreSQL-9.6.1-Remote-Code-Execution.html - () http://packetstormsecurity.com/files/171722/PostgreSQL-9.6.1-Remote-Code-Execution.html -
References () https://blog.hagander.net/when-a-vulnerability-is-not-a-vulnerability-244/ - Third Party Advisory () https://blog.hagander.net/when-a-vulnerability-is-not-a-vulnerability-244/ - Third Party Advisory
References () https://medium.com/greenwolf-security/authenticated-arbitrary-command-execution-on-postgresql-9-3-latest-cd18945914d5 - Exploit, Third Party Advisory () https://medium.com/greenwolf-security/authenticated-arbitrary-command-execution-on-postgresql-9-3-latest-cd18945914d5 - Exploit, Third Party Advisory
References () https://paquier.xyz/postgresql-2/postgres-9-3-feature-highlight-copy-tofrom-program/ - Third Party Advisory () https://paquier.xyz/postgresql-2/postgres-9-3-feature-highlight-copy-tofrom-program/ - Third Party Advisory
References () https://security.netapp.com/advisory/ntap-20190502-0003/ - Third Party Advisory () https://security.netapp.com/advisory/ntap-20190502-0003/ - Third Party Advisory
References () https://www.trustwave.com/en-us/resources/blogs/spiderlabs-blog/authenticated-arbitrary-command-execution-on-postgresql-9-3/ - Third Party Advisory () https://www.trustwave.com/en-us/resources/blogs/spiderlabs-blog/authenticated-arbitrary-command-execution-on-postgresql-9-3/ - Third Party Advisory

07 Nov 2023, 03:13

Type Values Removed Values Added
Summary ** DISPUTED ** In PostgreSQL 9.3 through 11.2, the "COPY TO/FROM PROGRAM" function allows superusers and users in the 'pg_execute_server_program' group to execute arbitrary code in the context of the database's operating system user. This functionality is enabled by default and can be abused to run arbitrary operating system commands on Windows, Linux, and macOS. NOTE: Third parties claim/state this is not an issue because PostgreSQL functionality for ‘COPY TO/FROM PROGRAM’ is acting as intended. References state that in PostgreSQL, a superuser can execute commands as the server user without using the ‘COPY FROM PROGRAM’. In PostgreSQL 9.3 through 11.2, the "COPY TO/FROM PROGRAM" function allows superusers and users in the 'pg_execute_server_program' group to execute arbitrary code in the context of the database's operating system user. This functionality is enabled by default and can be abused to run arbitrary operating system commands on Windows, Linux, and macOS. NOTE: Third parties claim/state this is not an issue because PostgreSQL functionality for ‘COPY TO/FROM PROGRAM’ is acting as intended. References state that in PostgreSQL, a superuser can execute commands as the server user without using the ‘COPY FROM PROGRAM’.

Information

Published : 2019-04-01 21:30

Updated : 2024-11-21 04:51


NVD link : CVE-2019-9193

Mitre link : CVE-2019-9193

CVE.ORG link : CVE-2019-9193


JSON object : View

Products Affected

postgresql

  • postgresql
CWE
CWE-78

Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')