CVE-2023-41114

An issue was discovered in EnterpriseDB Postgres Advanced Server (EPAS) before 11.21.32, 12.x before 12.16.20, 13.x before 13.12.16, 14.x before 14.9.0, and 15.x before 15.4.0. It contains the functions get_url_as_text and get_url_as_bytea that are publicly executable, thus permitting an authenticated user to read any file from the local filesystem or remote system regardless of that user's permissions.
Configurations

Configuration 1 (hide)

OR cpe:2.3:a:enterprisedb:postgres_advanced_server:*:*:*:*:*:*:*:*
cpe:2.3:a:enterprisedb:postgres_advanced_server:*:*:*:*:*:*:*:*
cpe:2.3:a:enterprisedb:postgres_advanced_server:*:*:*:*:*:*:*:*
cpe:2.3:a:enterprisedb:postgres_advanced_server:*:*:*:*:*:*:*:*
cpe:2.3:a:enterprisedb:postgres_advanced_server:*:*:*:*:*:*:*:*

History

21 Nov 2024, 08:20

Type Values Removed Values Added
References () https://www.enterprisedb.com/docs/security/advisories/cve202341114/ - Vendor Advisory () https://www.enterprisedb.com/docs/security/advisories/cve202341114/ - Vendor Advisory

14 Dec 2023, 16:48

Type Values Removed Values Added
New CVE

Information

Published : 2023-12-12 07:15

Updated : 2024-11-21 08:20


NVD link : CVE-2023-41114

Mitre link : CVE-2023-41114

CVE.ORG link : CVE-2023-41114


JSON object : View

Products Affected

enterprisedb

  • postgres_advanced_server