6
CVSSv2

CVE-2007-2138

Published: 24/04/2007 Updated: 19/10/2018
CVSS v2 Base Score: 6 | Impact Score: 6.4 | Exploitability Score: 6.8
VMScore: 534
Vector: AV:N/AC:M/Au:S/C:P/I:P/A:P

Vulnerability Summary

Untrusted search path vulnerability in PostgreSQL prior to 7.3.19, 7.4.x prior to 7.4.17, 8.0.x prior to 8.0.13, 8.1.x prior to 8.1.9, and 8.2.x prior to 8.2.4 allows remote authenticated users, when permitted to call a SECURITY DEFINER function, to gain the privileges of the function owner, related to "search_path settings."

Vulnerability Trend

Vulnerable Product Search on Vulmon Subscribe to Product

postgresql postgresql

debian debian linux 3.1

debian debian linux 4.0

canonical ubuntu linux 6.06

canonical ubuntu linux 7.04

canonical ubuntu linux 6.10

Vendor Advisories

PostgreSQL did not handle the “search_path” configuration option in a secure way for functions declared as “SECURITY DEFINER” ...
It was discovered that the PostgreSQL database performs insufficient validation of variables passed to privileged SQL statements, so called security definers, which could lead to SQL privilege escalation The oldstable distribution (sarge) doesn't contain PostgreSQL 81 For the stable distribution (etch) this problem has been fixed in version 81 ...
Given a suitable SECURITY DEFINER function, an attacker can execute arbitrary SQL under the identity of the function owner An attack requires EXECUTE permission on the function, which must itself contain a function call having inexact argument type match For example, length('foo'::varchar) and length('foo') are inexact, while length('foo'::text ...

References