aboutsummaryrefslogtreecommitdiff
diff options
context:
space:
mode:
authorTom Lane <tgl@sss.pgh.pa.us>2016-07-15 10:58:39 -0400
committerTom Lane <tgl@sss.pgh.pa.us>2016-07-15 10:58:39 -0400
commitce150e7e0fc1a127fee7933d71f4204a79ecce04 (patch)
tree59950c44017bdcb9e6aca9fe5e8fa2fd98a720fd
parent63cfdb8dde7f25a095af03aa204580fea55c6c07 (diff)
downloadpostgresql-ce150e7e0fc1a127fee7933d71f4204a79ecce04.tar.gz
postgresql-ce150e7e0fc1a127fee7933d71f4204a79ecce04.zip
Improve documentation about search_path for SECURITY DEFINER functions.
Clarify that the reason for recommending that pg_temp be put last is to prevent temporary tables from capturing unqualified table names. Per discussion with Albe Laurenz. Discussion: <A737B7A37273E048B164557ADEF4A58B5386C6E1@ntex2010i.host.magwien.gv.at>
-rw-r--r--doc/src/sgml/ref/create_function.sgml16
1 files changed, 11 insertions, 5 deletions
diff --git a/doc/src/sgml/ref/create_function.sgml b/doc/src/sgml/ref/create_function.sgml
index 097e2bd0f0b..abb0d33031e 100644
--- a/doc/src/sgml/ref/create_function.sgml
+++ b/doc/src/sgml/ref/create_function.sgml
@@ -750,14 +750,14 @@ SELECT * FROM dup(42);
ensure that the function cannot be misused. For security,
<xref linkend="guc-search-path"> should be set to exclude any schemas
writable by untrusted users. This prevents
- malicious users from creating objects that mask objects used by the
- function. Particularly important in this regard is the
+ malicious users from creating objects (e.g., tables, functions, and
+ operators) that mask objects intended to be used by the function.
+ Particularly important in this regard is the
temporary-table schema, which is searched first by default, and
is normally writable by anyone. A secure arrangement can be obtained
by forcing the temporary schema to be searched last. To do this,
write <literal>pg_temp</><indexterm><primary>pg_temp</><secondary>securing functions</></> as the last entry in <varname>search_path</>.
This function illustrates safe usage:
- </para>
<programlisting>
CREATE FUNCTION check_password(uname TEXT, pass TEXT)
@@ -776,11 +776,17 @@ $$ LANGUAGE plpgsql
SET search_path = admin, pg_temp;
</programlisting>
+ This function's intention is to access a table <literal>admin.pwds</>.
+ But without the <literal>SET</> clause, or with a <literal>SET</> clause
+ mentioning only <literal>admin</>, the function could be subverted by
+ creating a temporary table named <literal>pwds</>.
+ </para>
+
<para>
Before <productname>PostgreSQL</productname> version 8.3, the
- <literal>SET</> option was not available, and so older functions may
+ <literal>SET</> clause was not available, and so older functions may
contain rather complicated logic to save, set, and restore
- <varname>search_path</>. The <literal>SET</> option is far easier
+ <varname>search_path</>. The <literal>SET</> clause is far easier
to use for this purpose.
</para>