diff options
author | Tom Lane <tgl@sss.pgh.pa.us> | 2016-07-15 10:58:39 -0400 |
---|---|---|
committer | Tom Lane <tgl@sss.pgh.pa.us> | 2016-07-15 10:58:39 -0400 |
commit | ce150e7e0fc1a127fee7933d71f4204a79ecce04 (patch) | |
tree | 59950c44017bdcb9e6aca9fe5e8fa2fd98a720fd | |
parent | 63cfdb8dde7f25a095af03aa204580fea55c6c07 (diff) | |
download | postgresql-ce150e7e0fc1a127fee7933d71f4204a79ecce04.tar.gz postgresql-ce150e7e0fc1a127fee7933d71f4204a79ecce04.zip |
Improve documentation about search_path for SECURITY DEFINER functions.
Clarify that the reason for recommending that pg_temp be put last is to
prevent temporary tables from capturing unqualified table names. Per
discussion with Albe Laurenz.
Discussion: <A737B7A37273E048B164557ADEF4A58B5386C6E1@ntex2010i.host.magwien.gv.at>
-rw-r--r-- | doc/src/sgml/ref/create_function.sgml | 16 |
1 files changed, 11 insertions, 5 deletions
diff --git a/doc/src/sgml/ref/create_function.sgml b/doc/src/sgml/ref/create_function.sgml index 097e2bd0f0b..abb0d33031e 100644 --- a/doc/src/sgml/ref/create_function.sgml +++ b/doc/src/sgml/ref/create_function.sgml @@ -750,14 +750,14 @@ SELECT * FROM dup(42); ensure that the function cannot be misused. For security, <xref linkend="guc-search-path"> should be set to exclude any schemas writable by untrusted users. This prevents - malicious users from creating objects that mask objects used by the - function. Particularly important in this regard is the + malicious users from creating objects (e.g., tables, functions, and + operators) that mask objects intended to be used by the function. + Particularly important in this regard is the temporary-table schema, which is searched first by default, and is normally writable by anyone. A secure arrangement can be obtained by forcing the temporary schema to be searched last. To do this, write <literal>pg_temp</><indexterm><primary>pg_temp</><secondary>securing functions</></> as the last entry in <varname>search_path</>. This function illustrates safe usage: - </para> <programlisting> CREATE FUNCTION check_password(uname TEXT, pass TEXT) @@ -776,11 +776,17 @@ $$ LANGUAGE plpgsql SET search_path = admin, pg_temp; </programlisting> + This function's intention is to access a table <literal>admin.pwds</>. + But without the <literal>SET</> clause, or with a <literal>SET</> clause + mentioning only <literal>admin</>, the function could be subverted by + creating a temporary table named <literal>pwds</>. + </para> + <para> Before <productname>PostgreSQL</productname> version 8.3, the - <literal>SET</> option was not available, and so older functions may + <literal>SET</> clause was not available, and so older functions may contain rather complicated logic to save, set, and restore - <varname>search_path</>. The <literal>SET</> option is far easier + <varname>search_path</>. The <literal>SET</> clause is far easier to use for this purpose. </para> |