CVE-2020-14349
Description
It was found that PostgreSQL versions before 12.4, before 11.9 and before 10.14 did not properly sanitize the search_path during logical replication. An authenticated attacker could use this flaw in an attack similar to CVE-2018-1058, in order to execute arbitrary SQL command in the context of the user used for replication.
CWE
- (none)
Affected
- n/a / PostgreSQL — v=PostgreSQL versions before 12.4, before 11.9 and before 10.14 [affected]
CVSS
- (none)
References
- http://lists.opensuse.org/opensuse-security-announce/2020-08/msg00044.html vendor-advisory, x_refsource_SUSE
- http://lists.opensuse.org/opensuse-security-announce/2020-08/msg00049.html vendor-advisory, x_refsource_SUSE
- http://lists.opensuse.org/opensuse-security-announce/2020-08/msg00050.html vendor-advisory, x_refsource_SUSE
- https://bugzilla.redhat.com/show_bug.cgi?id=1865744 x_refsource_MISC
- https://security.gentoo.org/glsa/202008-13 vendor-advisory, x_refsource_GENTOO
- https://usn.ubuntu.com/4472-1/ vendor-advisory, x_refsource_UBUNTU
- http://lists.opensuse.org/opensuse-security-announce/2020-09/msg00003.html vendor-advisory, x_refsource_SUSE
- http://lists.opensuse.org/opensuse-security-announce/2020-09/msg00008.html vendor-advisory, x_refsource_SUSE
- https://security.netapp.com/advisory/ntap-20200918-0002/ x_refsource_CONFIRM
Source
cvelistV5-main/cves/2020/14xxx/CVE-2020-14349.json