diff options
author | Noah Misch <noah@leadboat.com> | 2023-08-07 06:05:56 -0700 |
---|---|---|
committer | Noah Misch <noah@leadboat.com> | 2023-08-07 06:06:00 -0700 |
commit | d4648a74be07bfb23b449c722303c320297c0327 (patch) | |
tree | 377221d52bd9b38bd5e336219100e759cdcb6bb6 /src/backend/utils/adt/network_spgist.c | |
parent | 6186e2775e0c159e9e4fc4d8df23f8d5e66dccce (diff) | |
download | postgresql-d4648a74be07bfb23b449c722303c320297c0327.tar.gz postgresql-d4648a74be07bfb23b449c722303c320297c0327.zip |
Reject substituting extension schemas or owners matching ["$'\].
Substituting such values in extension scripts facilitated SQL injection
when @extowner@, @extschema@, or @extschema:...@ appeared inside a
quoting construct (dollar quoting, '', or ""). No bundled extension was
vulnerable. Vulnerable uses do appear in a documentation example and in
non-bundled extensions. Hence, the attack prerequisite was an
administrator having installed files of a vulnerable, trusted,
non-bundled extension. Subject to that prerequisite, this enabled an
attacker having database-level CREATE privilege to execute arbitrary
code as the bootstrap superuser. By blocking this attack in the core
server, there's no need to modify individual extensions. Back-patch to
v11 (all supported versions).
Reported by Micah Gate, Valerie Woolard, Tim Carey-Smith, and Christoph
Berg.
Security: CVE-2023-39417
Diffstat (limited to 'src/backend/utils/adt/network_spgist.c')
0 files changed, 0 insertions, 0 deletions