CVE-2020-14350

Severity CVSS v4.0:
Pending analysis
Type:
CWE-426 Untrusted Search Path
Publication date:
24/08/2020
Last modified:
24/01/2023

Description

It was found that some PostgreSQL extensions did not use search_path safely in their installation script. An attacker with sufficient privileges could use this flaw to trick an administrator into executing a specially crafted script, during the installation or update of such extension. This affects PostgreSQL versions before 12.4, before 11.9, before 10.14, before 9.6.19, and before 9.5.23.

Vulnerable products and versions

CPE From Up to
cpe:2.3:a:postgresql:postgresql:*:*:*:*:*:*:*:* 9.5 (including) 9.5.23 (excluding)
cpe:2.3:a:postgresql:postgresql:*:*:*:*:*:*:*:* 9.6 (including) 9.6.19 (excluding)
cpe:2.3:a:postgresql:postgresql:*:*:*:*:*:*:*:* 10.0 (including) 10.14 (excluding)
cpe:2.3:a:postgresql:postgresql:*:*:*:*:*:*:*:* 11.0 (including) 11.9 (excluding)
cpe:2.3:a:postgresql:postgresql:*:*:*:*:*:*:*:* 12.0 (including) 12.4 (excluding)
cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*
cpe:2.3:o:opensuse:leap:15.1:*:*:*:*:*:*:*
cpe:2.3:o:opensuse:leap:15.2:*:*:*:*:*:*:*
cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:esm:*:*:*
cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:lts:*:*:*
cpe:2.3:o:canonical:ubuntu_linux:20.04:*:*:*:lts:*:*:*