Home

Description

IN THE EXTENSION SCRIPT, a SQL Injection vulnerability was found in PostgreSQL if it uses @extowner@, @extschema@, or @extschema:...@ inside a quoting construct (dollar quoting, '', or ""). If an administrator has installed files of a vulnerable, trusted, non-bundled extension, an attacker with database-level CREATE privilege can execute arbitrary code as the bootstrap superuser.

PUBLISHED Reserved 2023-08-01 | Published 2023-08-11 | Updated 2026-03-12 | Assigner redhat




HIGH: 7.5CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H

Problem types

Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')

Product status

Default status
affected

4.2.4-6 (rpm) before *
unaffected

Default status
affected

4.2.4-6 (rpm) before *
unaffected

Default status
affected

4.2.4-7 (rpm) before *
unaffected

Default status
affected

4.2.4-6 (rpm) before *
unaffected

Default status
affected

4.2.4-7 (rpm) before *
unaffected

Default status
affected

8090020231114113712.a75119d5 (rpm) before *
unaffected

Default status
affected

8090020231128173330.a75119d5 (rpm) before *
unaffected

Default status
affected

8090020231114113548.a75119d5 (rpm) before *
unaffected

Default status
affected

8020020231128165246.4cda2c84 (rpm) before *
unaffected

Default status
affected

8020020231128165246.4cda2c84 (rpm) before *
unaffected

Default status
affected

8020020231128165246.4cda2c84 (rpm) before *
unaffected

Default status
affected

8040020231127153301.522a0ee4 (rpm) before *
unaffected

Default status
affected

8040020231127154806.522a0ee4 (rpm) before *
unaffected

Default status
affected

8040020231127153301.522a0ee4 (rpm) before *
unaffected

Default status
affected

8040020231127154806.522a0ee4 (rpm) before *
unaffected

Default status
affected

8040020231127153301.522a0ee4 (rpm) before *
unaffected

Default status
affected

8040020231127154806.522a0ee4 (rpm) before *
unaffected

Default status
affected

8060020231114115246.ad008a3a (rpm) before *
unaffected

Default status
affected

8060020231128165328.ad008a3a (rpm) before *
unaffected

Default status
affected

8080020231114105206.63b34585 (rpm) before *
unaffected

Default status
affected

8080020231128165335.63b34585 (rpm) before *
unaffected

Default status
affected

8080020231113134015.63b34585 (rpm) before *
unaffected

Default status
affected

0:13.13-1.el9_3 (rpm) before *
unaffected

Default status
affected

9030020231120082734.rhel9 (rpm) before *
unaffected

Default status
affected

0:13.13-1.el9_0 (rpm) before *
unaffected

Default status
affected

0:13.13-1.el9_2 (rpm) before *
unaffected

Default status
affected

9020020231115020618.rhel9 (rpm) before *
unaffected

Default status
affected

0:12.17-1.el7 (rpm) before *
unaffected

Default status
affected

0:13.13-1.el7 (rpm) before *
unaffected

Default status
affected

3.74.8-9 (rpm) before *
unaffected

Default status
affected

3.74.8-9 (rpm) before *
unaffected

Default status
affected

3.74.8-7 (rpm) before *
unaffected

Default status
affected

3.74.8-9 (rpm) before *
unaffected

Default status
affected

3.74.8-9 (rpm) before *
unaffected

Default status
affected

4.1.6-6 (rpm) before *
unaffected

Default status
affected

4.1.6-6 (rpm) before *
unaffected

Default status
affected

4.1.6-6 (rpm) before *
unaffected

Default status
affected

4.1.6-6 (rpm) before *
unaffected

Default status
affected

4.1.6-6 (rpm) before *
unaffected

Default status
unknown

Default status
unknown

Default status
unaffected

Default status
affected

Timeline

2023-08-01:Reported to Red Hat.
2023-08-10:Made public.

References

access.redhat.com/errata/RHSA-2023:7545 (RHSA-2023:7545) vendor-advisory

access.redhat.com/errata/RHSA-2023:7579 (RHSA-2023:7579) vendor-advisory

access.redhat.com/errata/RHSA-2023:7580 (RHSA-2023:7580) vendor-advisory

access.redhat.com/errata/RHSA-2023:7581 (RHSA-2023:7581) vendor-advisory

access.redhat.com/errata/RHSA-2023:7616 (RHSA-2023:7616) vendor-advisory

access.redhat.com/errata/RHSA-2023:7656 (RHSA-2023:7656) vendor-advisory

access.redhat.com/errata/RHSA-2023:7666 (RHSA-2023:7666) vendor-advisory

access.redhat.com/errata/RHSA-2023:7667 (RHSA-2023:7667) vendor-advisory

access.redhat.com/errata/RHSA-2023:7694 (RHSA-2023:7694) vendor-advisory

access.redhat.com/errata/RHSA-2023:7695 (RHSA-2023:7695) vendor-advisory

access.redhat.com/errata/RHSA-2023:7714 (RHSA-2023:7714) vendor-advisory

access.redhat.com/errata/RHSA-2023:7770 (RHSA-2023:7770) vendor-advisory

access.redhat.com/errata/RHSA-2023:7772 (RHSA-2023:7772) vendor-advisory

access.redhat.com/errata/RHSA-2023:7784 (RHSA-2023:7784) vendor-advisory

access.redhat.com/errata/RHSA-2023:7785 (RHSA-2023:7785) vendor-advisory

access.redhat.com/errata/RHSA-2023:7883 (RHSA-2023:7883) vendor-advisory

access.redhat.com/errata/RHSA-2023:7884 (RHSA-2023:7884) vendor-advisory

access.redhat.com/errata/RHSA-2023:7885 (RHSA-2023:7885) vendor-advisory

access.redhat.com/errata/RHSA-2024:0304 (RHSA-2024:0304) vendor-advisory

access.redhat.com/errata/RHSA-2024:0332 (RHSA-2024:0332) vendor-advisory

access.redhat.com/errata/RHSA-2024:0337 (RHSA-2024:0337) vendor-advisory

access.redhat.com/security/cve/CVE-2023-39417 vdb-entry

bugzilla.redhat.com/show_bug.cgi?id=2228111 (RHBZ#2228111) issue-tracking

lists.debian.org/debian-lts-announce/2023/10/msg00003.html

security.netapp.com/advisory/ntap-20230915-0002/

www.debian.org/security/2023/dsa-5553

www.debian.org/security/2023/dsa-5554

www.postgresql.org/support/security/CVE-2023-39417

access.redhat.com/errata/RHSA-2023:7545 (RHSA-2023:7545) vendor-advisory

access.redhat.com/errata/RHSA-2023:7579 (RHSA-2023:7579) vendor-advisory

access.redhat.com/errata/RHSA-2023:7580 (RHSA-2023:7580) vendor-advisory

access.redhat.com/errata/RHSA-2023:7581 (RHSA-2023:7581) vendor-advisory

access.redhat.com/errata/RHSA-2023:7616 (RHSA-2023:7616) vendor-advisory

access.redhat.com/errata/RHSA-2023:7656 (RHSA-2023:7656) vendor-advisory

access.redhat.com/errata/RHSA-2023:7666 (RHSA-2023:7666) vendor-advisory

access.redhat.com/errata/RHSA-2023:7667 (RHSA-2023:7667) vendor-advisory

access.redhat.com/errata/RHSA-2023:7694 (RHSA-2023:7694) vendor-advisory

access.redhat.com/errata/RHSA-2023:7695 (RHSA-2023:7695) vendor-advisory

access.redhat.com/errata/RHSA-2023:7714 (RHSA-2023:7714) vendor-advisory

access.redhat.com/errata/RHSA-2023:7770 (RHSA-2023:7770) vendor-advisory

access.redhat.com/errata/RHSA-2023:7772 (RHSA-2023:7772) vendor-advisory

access.redhat.com/errata/RHSA-2023:7784 (RHSA-2023:7784) vendor-advisory

access.redhat.com/errata/RHSA-2023:7785 (RHSA-2023:7785) vendor-advisory

access.redhat.com/errata/RHSA-2023:7883 (RHSA-2023:7883) vendor-advisory

access.redhat.com/errata/RHSA-2023:7884 (RHSA-2023:7884) vendor-advisory

access.redhat.com/errata/RHSA-2023:7885 (RHSA-2023:7885) vendor-advisory

access.redhat.com/errata/RHSA-2024:0304 (RHSA-2024:0304) vendor-advisory

access.redhat.com/errata/RHSA-2024:0332 (RHSA-2024:0332) vendor-advisory

access.redhat.com/errata/RHSA-2024:0337 (RHSA-2024:0337) vendor-advisory

access.redhat.com/security/cve/CVE-2023-39417 vdb-entry

bugzilla.redhat.com/show_bug.cgi?id=2228111 (RHBZ#2228111) issue-tracking

www.postgresql.org/support/security/CVE-2023-39417

cve.org (CVE-2023-39417)

nvd.nist.gov (CVE-2023-39417)

Download JSON