aboutsummaryrefslogtreecommitdiff
path: root/src/backend/executor/nodeFunctionscan.c
diff options
context:
space:
mode:
authorNoah Misch <noah@leadboat.com>2020-11-09 07:32:09 -0800
committerNoah Misch <noah@leadboat.com>2020-11-09 07:32:13 -0800
commit3855e5b4767b189d4daf6e9a774e4e64be72e0ff (patch)
tree62ac627c93c2f4c42795f0078213b8de3e080bf5 /src/backend/executor/nodeFunctionscan.c
parentac8f6243cb002f3386322fb231a0c5daa637941d (diff)
downloadpostgresql-3855e5b4767b189d4daf6e9a774e4e64be72e0ff.tar.gz
postgresql-3855e5b4767b189d4daf6e9a774e4e64be72e0ff.zip
Ignore attempts to \gset into specially treated variables.
If an interactive psql session used \gset when querying a compromised server, the attacker could execute arbitrary code as the operating system account running psql. Using a prefix not found among specially treated variables, e.g. every lowercase string, precluded the attack. Fix by issuing a warning and setting no variable for the column in question. Users wanting the old behavior can use a prefix and then a meta-command like "\set HISTSIZE :prefix_HISTSIZE". Back-patch to 9.5 (all supported versions). Reviewed by Robert Haas. Reported by Nick Cleaton. Security: CVE-2020-25696
Diffstat (limited to 'src/backend/executor/nodeFunctionscan.c')
0 files changed, 0 insertions, 0 deletions