

If an interactive psql session uses \gset when querying a compromised server, the attacker can execute arbitrary code as the operating system account running psql. The highest threat from this vulnerability is to confidentiality.Ī flaw was found in the psql interactive terminal of PostgreSQL in versions before 13.1, before 12.5, before 11.10, before 10.15, before 9.6.20 and before 9.5.24. This flaw allows a user with SELECT privilege on one column to craft a special query that returns all columns of the table. This only impacts Rails applications that are using PostgreSQL along with money type columns that take user input.Ī flaw was found in PostgreSQL in versions before 13.2. Carefully crafted input can cause the input validation in the `money` type of the PostgreSQL adapter in Active Record to spend too much time in a regular expression, resulting in the potential for a DoS attack. The PostgreSQL adapter in Active Record before 6.1.2.1, 6.0.3.5, 5.2.4.5 suffers from a regular expression denial of service (REDoS) vulnerability. The highest threat from this vulnerability is to data confidentiality and integrity as well as system availability. While modifying certain SQL array values, missing bounds checks let authenticated database users write arbitrary bytes to a wide area of server memory. In the pg_partman (aka PG Partition Manager) extension before 4.5.1 for PostgreSQL, arbitrary code execution can be achieved via SECURITY DEFINER functions because an explicit search_path is not set.Ī flaw was found in postgresql in versions before 13.3, before 12.7, before 11.12, before 10.17 and before 9.6.22. This can result in reading local files via vectors involving XMLHttpRequest and open of a file:/// URL, or discovering PostgreSQL passwords via vectors involving Window.localStorage and savedConnections.


Postbird 0.8.4 allows stored XSS via the onerror attribute of an IMG element in any PostgreSQL database table. An attacker could use this flaw to obtain information stored in a column they are allowed to write but not read.
#POSTGRESQL 9.2 INSTALL DBLINK UPDATE#
A user having UPDATE permission but not SELECT permission to a particular column could craft queries which, under some circumstances, might disclose values from that column in error messages.

An attacker with CREATEDB privileges on a PostgreSQL server can craft a database name that allows execution of shell commands as the postgresql user when calling pglogical.create_subscription().Īn information leak was discovered in postgresql in versions before 13.2, before 12.6 and before 11.11. The set_user extension module before 2.0.1 for PostgreSQL allows a potential privilege escalation using RESET SESSION AUTHORIZATION after set_user().Ī shell injection flaw was found in pglogical in versions before 2.3.4 and before 3.6.26.
