Vigil@nce - PostgreSQL: SQL injection via pg_upgrade/pg_dump
January 2019 by Vigil@nce
This bulletin was written by Vigil@nce : https://vigilance.fr/offer
SYNTHESIS OF THE VULNERABILITY
An attacker can use a SQL injection via pg_upgrade/pg_dump of
PostgreSQL, in order to read or alter data.
Impacted products: Unisphere EMC, openSUSE Leap, PostgreSQL, RHEL,
SUSE Linux Enterprise Desktop, SLES, Ubuntu.
Severity: 2/4.
Consequences: data reading, data creation/edition, data deletion.
Provenance: internet client.
Confidence: confirmed by the editor (5/5).
Creation date: 08/11/2018.
Revision date: 09/11/2018.
DESCRIPTION OF THE VULNERABILITY
The PostgreSQL product uses a database.
However, user’s data are directly inserted in a SQL query.
An attacker can therefore use a SQL injection via
pg_upgrade/pg_dump of PostgreSQL, in order to read or alter data.
ACCESS TO THE COMPLETE VIGIL@NCE BULLETIN
https://vigilance.fr/vulnerability/PostgreSQL-SQL-injection-via-pg-upgrade-pg-dump-27738