Incorrect control of environment variables in PostgreSQL PL/Perl allows an unprivileged database user to change sensitive process environment variables (e.g. PATH). That often suffices to enable arbitrary code execution, even if the attacker lacks a database server operating system user. Versions before PostgreSQL 17.1, 16.5, 15.9, 14.14, 13.17, and 12.21 are affected.
Metrics
Affected Vendors & Products
References
Link | Providers |
---|---|
https://www.postgresql.org/support/security/CVE-2024-10979/ |
History
Thu, 14 Nov 2024 15:15:00 +0000
Type | Values Removed | Values Added |
---|---|---|
First Time appeared |
Postgresql
Postgresql postgresql |
|
CPEs | cpe:2.3:a:postgresql:postgresql:-:*:*:*:*:*:*:* | |
Vendors & Products |
Postgresql
Postgresql postgresql |
|
Metrics |
ssvc
|
Thu, 14 Nov 2024 13:15:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Description | Incorrect control of environment variables in PostgreSQL PL/Perl allows an unprivileged database user to change sensitive process environment variables (e.g. PATH). That often suffices to enable arbitrary code execution, even if the attacker lacks a database server operating system user. Versions before PostgreSQL 17.1, 16.5, 15.9, 14.14, 13.17, and 12.21 are affected. | |
Title | PostgreSQL PL/Perl environment variable changes execute arbitrary code | |
Weaknesses | CWE-15 | |
References |
| |
Metrics |
cvssV3_1
|
MITRE
Status: PUBLISHED
Assigner: PostgreSQL
Published: 2024-11-14T13:00:08.586Z
Updated: 2024-11-14T14:36:38.312Z
Reserved: 2024-11-07T19:27:04.476Z
Link: CVE-2024-10979
Vulnrichment
Updated: 2024-11-14T14:36:25.467Z
NVD
Status : Received
Published: 2024-11-14T13:15:04.407
Modified: 2024-11-14T13:15:04.407
Link: CVE-2024-10979
Redhat
No data.