CVE-2023-32305
Summary
| CVE | CVE-2023-32305 |
|---|---|
| State | PUBLIC |
| Assigner | [email protected] |
| Source Priority | CVE Program / NVD first with legacy fallback |
| Published | 2023-05-12 19:15:00 UTC |
| Updated | 2024-02-01 14:06:00 UTC |
| Description | aiven-extras is a PostgreSQL extension. Versions prior to 1.1.9 contain a privilege escalation vulnerability, allowing elevation to superuser inside PostgreSQL databases that use the aiven-extras package. The vulnerability leverages missing schema qualifiers on privileged functions called by the aiven-extras extension. A low privileged user can create objects that collide with existing function names, which will then be executed instead. Exploiting this vulnerability could allow a low privileged user to acquire `superuser` privileges, which would allow full, unrestricted access to all data and database functions. And could lead to arbitrary code execution or data access on the underlying host as the `postgres` user. The issue has been patched as of version 1.1.9. |
Risk And Classification
Problem Types: CWE-20
NVD Known Affected Configurations (CPE 2.3)
| Type | Vendor | Product | Version | Update | Edition | Language |
|---|---|---|---|---|---|---|
| Application | Aiven | Aiven | All | All | All | All |
| Application | Postgresql | Postgresql | All | All | All | All |
| Application | Postgresql | Postgresql | All | All | All | All |
| Application | Postgresql | Postgresql | All | All | All | All |
| Application | Postgresql | Postgresql | All | All | All | All |
| Application | Postgresql | Postgresql | All | All | All | All |
References
| Reference | Source | Link | Tags |
|---|---|---|---|
| PostgreSQL Privilege Escalation Through Missing Schema Qualifiers · Advisory · aiven/aiven-extras · GitHub | MISC | github.com | |
| Qualify function calls with pg_catalog schema · aiven/aiven-extras@8682ae0 · GitHub | MISC | github.com | |
| CVE-2023-32305 PostgreSQL Vulnerability in NetApp Products | NetApp Product Security | MISC | security.netapp.com | |
| CVE Program record | CVE.ORG | www.cve.org | canonical |
| NVD vulnerability detail | NVD | nvd.nist.gov | canonical, analysis |
No vendor comments have been submitted for this CVE.
There are currently no legacy QID mappings associated with this CVE.