{"api_version":"1","generated_at":"2026-04-23T04:10:01+00:00","cve":"CVE-2020-10733","urls":{"html":"https://cve.report/CVE-2020-10733","api":"https://cve.report/api/cve/CVE-2020-10733.json","docs":"https://cve.report/api","cve_org":"https://www.cve.org/CVERecord?id=CVE-2020-10733","nvd":"https://nvd.nist.gov/vuln/detail/CVE-2020-10733"},"summary":{"title":"CVE-2020-10733","description":"The Windows installer for PostgreSQL 9.5 - 12 invokes system-provided executables that do not have fully-qualified paths. Executables in the directory where the installer loads or the current working directory take precedence over the intended executables. An attacker having permission to add files into one of those directories can use this to execute arbitrary code with the installer's administrative rights.","state":"PUBLIC","assigner":"secalert@redhat.com","published_at":"2020-09-16 15:15:00","updated_at":"2022-01-06 14:19:00"},"problem_types":["CWE-426"],"metrics":[],"references":[{"url":"https://security.netapp.com/advisory/ntap-20201001-0006/","name":"https://security.netapp.com/advisory/ntap-20201001-0006/","refsource":"CONFIRM","tags":[],"title":"CVE-2020-10733 PostgreSQL Vulnerability in NetApp Products | NetApp Product Security","mime":"text/html","httpstatus":"200","archivestatus":"0"},{"url":"https://www.postgresql.org/about/news/2038/","name":"https://www.postgresql.org/about/news/2038/","refsource":"MISC","tags":["Vendor Advisory"],"title":"PostgreSQL: PostgreSQL 12.3, 11.8, 10.13, 9.6.18, and 9.5.22 Released!","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"https://www.postgresql.org/support/security/11/","name":"https://www.postgresql.org/support/security/11/","refsource":"MISC","tags":["Vendor Advisory"],"title":"PostgreSQL: Security Information","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"https://www.cve.org/CVERecord?id=CVE-2020-10733","name":"CVE Program record","refsource":"CVE.ORG","tags":["canonical"]},{"url":"https://nvd.nist.gov/vuln/detail/CVE-2020-10733","name":"NVD vulnerability detail","refsource":"NVD","tags":["canonical","analysis"]}],"affected":[],"timeline":[],"solutions":[],"workarounds":[],"exploits":[],"credits":[],"nvd_cpes":[{"cve_year":"2020","cve_id":"10733","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"postgresql","cpe5":"postgresql","cpe6":"*","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2020","cve_id":"10733","vulnerable":"1","versionEndIncluding":"1","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"postgresql","cpe5":"postgresql","cpe6":"*","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"}],"vendor_comments":[],"enrichments":{"kev":null,"epss":null,"legacy_qids":[{"cve":"CVE-2020-10733","qid":"900047","title":"CBL-Mariner Linux Security Update for postgresql 12.1"},{"cve":"CVE-2020-10733","qid":"903044","title":"Common Base Linux Mariner (CBL-Mariner) Security Update for postgresql (2659)"}]},"source_records":{"cve_program":{"data_type":"CVE","data_format":"MITRE","data_version":"4.0","CVE_data_meta":{"ID":"CVE-2020-10733","ASSIGNER":"secalert@redhat.com","STATE":"PUBLIC"},"affects":{"vendor":{"vendor_data":[{"vendor_name":"n/a","product":{"product_data":[{"product_name":"PostgreSQL","version":{"version_data":[{"version_value":"9.5, 9.6, 10, 11, 12"}]}}]}}]}},"problemtype":{"problemtype_data":[{"description":[{"lang":"eng","value":"CWE-426"}]}]},"references":{"reference_data":[{"refsource":"MISC","name":"https://www.postgresql.org/support/security/11/","url":"https://www.postgresql.org/support/security/11/"},{"refsource":"MISC","name":"https://www.postgresql.org/about/news/2038/","url":"https://www.postgresql.org/about/news/2038/"},{"refsource":"CONFIRM","name":"https://security.netapp.com/advisory/ntap-20201001-0006/","url":"https://security.netapp.com/advisory/ntap-20201001-0006/"}]},"description":{"description_data":[{"lang":"eng","value":"The Windows installer for PostgreSQL 9.5 - 12 invokes system-provided executables that do not have fully-qualified paths. Executables in the directory where the installer loads or the current working directory take precedence over the intended executables. An attacker having permission to add files into one of those directories can use this to execute arbitrary code with the installer's administrative rights."}]}},"nvd":{"publishedDate":"2020-09-16 15:15:00","lastModifiedDate":"2022-01-06 14:19:00","problem_types":["CWE-426"],"metrics":{"baseMetricV3":{"cvssV3":{"version":"3.1","vectorString":"CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H","attackVector":"LOCAL","attackComplexity":"LOW","privilegesRequired":"LOW","userInteraction":"REQUIRED","scope":"UNCHANGED","confidentialityImpact":"HIGH","integrityImpact":"HIGH","availabilityImpact":"HIGH","baseScore":7.3,"baseSeverity":"HIGH"},"exploitabilityScore":1.3,"impactScore":5.9},"baseMetricV2":{"cvssV2":{"version":"2.0","vectorString":"AV:L/AC:M/Au:N/C:P/I:P/A:P","accessVector":"LOCAL","accessComplexity":"MEDIUM","authentication":"NONE","confidentialityImpact":"PARTIAL","integrityImpact":"PARTIAL","availabilityImpact":"PARTIAL","baseScore":4.4},"severity":"MEDIUM","exploitabilityScore":3.4,"impactScore":6.4,"acInsufInfo":false,"obtainAllPrivilege":false,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":true}},"configurations":{"CVE_data_version":"4.0","nodes":[{"operator":"OR","children":[],"cpe_match":[{"vulnerable":true,"cpe23Uri":"cpe:2.3:a:postgresql:postgresql:*:*:*:*:*:*:*:*","versionStartIncluding":"9.6","versionEndExcluding":"9.6.18","cpe_name":[]},{"vulnerable":true,"cpe23Uri":"cpe:2.3:a:postgresql:postgresql:*:*:*:*:*:*:*:*","versionStartIncluding":"11.0","versionEndExcluding":"11.8","cpe_name":[]},{"vulnerable":true,"cpe23Uri":"cpe:2.3:a:postgresql:postgresql:*:*:*:*:*:*:*:*","versionStartIncluding":"10.0","versionEndExcluding":"10.13","cpe_name":[]},{"vulnerable":true,"cpe23Uri":"cpe:2.3:a:postgresql:postgresql:*:*:*:*:*:*:*:*","versionStartIncluding":"12.0","versionEndExcluding":"12.3","cpe_name":[]},{"vulnerable":true,"cpe23Uri":"cpe:2.3:a:postgresql:postgresql:*:*:*:*:*:*:*:*","versionStartIncluding":"9.5","versionEndExcluding":"9.5.22","cpe_name":[]}]}]}},"legacy_mitre":{"record":{"CveYear":"2020","CveId":"10733","Ordinal":"171173","Title":"CVE-2020-10733","CVE":"CVE-2020-10733","Year":"2020"},"notes":[{"CveYear":"2020","CveId":"10733","Ordinal":"1","NoteData":"The Windows installer for PostgreSQL 9.5 - 12 invokes system-provided executables that do not have fully-qualified paths. Executables in the directory where the installer loads or the current working directory take precedence over the intended executables. An attacker having permission to add files into one of those directories can use this to execute arbitrary code with the installer's administrative rights.","Type":"Description","Title":null},{"CveYear":"2020","CveId":"10733","Ordinal":"2","NoteData":"2020-09-16","Type":"Other","Title":"Published"},{"CveYear":"2020","CveId":"10733","Ordinal":"3","NoteData":"2020-10-01","Type":"Other","Title":"Modified"}]}}}