A shell injection flaw was found in pglogical in versions before 2.3.4 and before 3.6.26. An attacker with CREATEDB privileges on a PostgreSQL server can craft a database name that allows execution of shell commands as the postgresql user when calling pglogical.create_subscription().
References
Link | Resource |
---|---|
https://bugzilla.redhat.com/show_bug.cgi?id=1954112 | Issue Tracking Patch Third Party Advisory |
https://bugzilla.redhat.com/show_bug.cgi?id=1954112 | Issue Tracking Patch Third Party Advisory |
Configurations
Configuration 1 (hide)
|
History
21 Nov 2024, 06:21
Type | Values Removed | Values Added |
---|---|---|
References | () https://bugzilla.redhat.com/show_bug.cgi?id=1954112 - Issue Tracking, Patch, Third Party Advisory |
Information
Published : 2021-06-01 14:15
Updated : 2024-11-21 06:21
NVD link : CVE-2021-3515
Mitre link : CVE-2021-3515
CVE.ORG link : CVE-2021-3515
JSON object : View
Products Affected
2ndquadrant
- pglogical