Risk | Medium |
Patch available | YES |
Number of vulnerabilities | 2 |
CVE-ID | CVE-2020-14349 CVE-2020-14350 |
CWE-ID | CWE-426 |
Exploitation vector | Network |
Public exploit | N/A |
Vulnerable software Subscribe |
PostgreSQL Server applications / Database software |
Vendor | PostgreSQL Global Development Group |
Security Bulletin
This security bulletin contains information about 2 vulnerabilities.
EUVDB-ID: #VU45748
Risk: Medium
CVSSv3.1:
CVE-ID: CVE-2020-14349
CWE-ID:
Exploit availability:
DescriptionThe vulnerability allows a remote user to escalate privileges within the database.
The vulnerability exists due to the way PostgreSQL handles search_path
during replications. Users of a
replication publisher or subscriber database can create objects in the public
schema and harness them to execute arbitrary SQL functions under the identity
running replication, often a superuser.
Install updates from vendor's website.
Vulnerable software versionsPostgreSQL: 10.3 - 12.3
Fixed software versionsCPE2.3 External links
http://www.postgresql.org/about/news/2060
Q & A
Can this vulnerability be exploited remotely?
How the attacker can exploit this vulnerability?
Is there known malware, which exploits this vulnerability?
EUVDB-ID: #VU45749
Risk: Medium
CVSSv3.1:
CVE-ID: CVE-2020-14350
CWE-ID:
Exploit availability:
DescriptionThe vulnerability allows a remote user to escalate privileges within the database.
The vulnerability exists due to the way PostgreSQL handles CREATE EXTENSION
statements. A remote user with permission to create objects in the new extension's schema
or a schema of a prerequisite extension can execute arbitrary SQL functions under the identity of the superuser in certain cases.
Install updates from vendor's website.
Vulnerable software versionsPostgreSQL: 9.5 - 12.3
Fixed software versionsCPE2.3 External links
http://www.postgresql.org/about/news/2060
Q & A
Can this vulnerability be exploited remotely?
How the attacker can exploit this vulnerability?
Is there known malware, which exploits this vulnerability?