vulnerability
Rocky Linux: CVE-2023-39417: postgresql-15 (Multiple Advisories)
Severity | CVSS | Published | Added | Modified |
---|---|---|---|---|
9 | (AV:N/AC:L/Au:S/C:C/I:C/A:C) | Aug 11, 2023 | Mar 5, 2024 | Jan 30, 2025 |
Severity
9
CVSS
(AV:N/AC:L/Au:S/C:C/I:C/A:C)
Published
Aug 11, 2023
Added
Mar 5, 2024
Modified
Jan 30, 2025
Description
IN THE EXTENSION SCRIPT, a SQL Injection vulnerability was found in PostgreSQL if it uses @extowner@, @extschema@, or @extschema:...@ inside a quoting construct (dollar quoting, '', or ""). If an administrator has installed files of a vulnerable, trusted, non-bundled extension, an attacker with database-level CREATE privilege can execute arbitrary code as the bootstrap superuser.
Solution(s)
rocky-upgrade-pg_repackrocky-upgrade-pg_repack-debuginforocky-upgrade-pg_repack-debugsourcerocky-upgrade-pgauditrocky-upgrade-pgaudit-debuginforocky-upgrade-pgaudit-debugsourcerocky-upgrade-postgres-decoderbufsrocky-upgrade-postgres-decoderbufs-debuginforocky-upgrade-postgres-decoderbufs-debugsourcerocky-upgrade-postgresqlrocky-upgrade-postgresql-contribrocky-upgrade-postgresql-contrib-debuginforocky-upgrade-postgresql-debuginforocky-upgrade-postgresql-debugsourcerocky-upgrade-postgresql-docsrocky-upgrade-postgresql-docs-debuginforocky-upgrade-postgresql-plperlrocky-upgrade-postgresql-plperl-debuginforocky-upgrade-postgresql-plpython3rocky-upgrade-postgresql-plpython3-debuginforocky-upgrade-postgresql-pltclrocky-upgrade-postgresql-pltcl-debuginforocky-upgrade-postgresql-serverrocky-upgrade-postgresql-server-debuginforocky-upgrade-postgresql-server-develrocky-upgrade-postgresql-server-devel-debuginforocky-upgrade-postgresql-staticrocky-upgrade-postgresql-testrocky-upgrade-postgresql-test-debuginforocky-upgrade-postgresql-upgraderocky-upgrade-postgresql-upgrade-debuginforocky-upgrade-postgresql-upgrade-develrocky-upgrade-postgresql-upgrade-devel-debuginfo

NEW
Explore Exposure Command
Confidently identify and prioritize exposures from endpoint to cloud with full attack surface visibility and threat-aware risk context.