Impact
PostgreSQL Anonymizer allows a user with CREATE privilege to elevate themselves to superuser by creating a temporary view that points to a function containing malicious code. When the anon.get_tablesample_ratio function is then invoked, the malicious code executes with superuser privileges, giving the attacker full control over the database instance and the ability to exfiltrate data, modify data, and disrupt services.
Affected Systems
Deployments of DALIBO PostgreSQL Anonymizer version 2.5 and any earlier releases that have not been upgraded to 3.0.1 or later. The vulnerability also affects PostgreSQL 15 and later, because users with CREATE privilege can exploit it. For PostgreSQL 14 or instances upgraded from PostgreSQL 14 or earlier, the risk is higher due to the default grant of CREATE on the public schema.
Risk and Exploitability
The CVSS score is 8, indicating high severity. The EPSS score is less than 1%, and the vulnerability is not listed in the CISA KEV catalog. The likely attack vector is a user with database create privileges, possibly via a remote connection if credentials are obtained or through an insider role. This privilege escalation can lead to full database compromise, affecting confidentiality, integrity, and availability.
OpenCVE Enrichment