Headline
8.8 Rated PostgreSQL Vulnerability Puts Databases at Risk
Cybersecurity researchers at Varonis have identified a serious security vulnerability in PostgreSQL that could lead to data breaches…
Cybersecurity researchers at Varonis have identified a serious security vulnerability in PostgreSQL that could lead to data breaches and system compromise. Learn about the technical details, affected versions, and how to mitigate this threat.
Tal Peleg and Coby Abrams, cybersecurity researchers at Varonis, have discovered a high-severity vulnerability in the widely-used open-source database system, PostgreSQL. This vulnerability, tracked as CVE-2024-10979, has the potential to compromise the security of countless databases worldwide.
According to Varonis’ report shared with Hackread.com ahead of publishing on Friday, this vulnerability scores a concerning 8.8 on the CVSS severity scale, which highlights the severity of the flaw. The concerning aspect is that any PostgreSQL version before 17.1, 16.5, 15.9, 14.14, 13.17, and 12.21 is vulnerable.
It allows unprivileged users to manipulate environment variables within the PostgreSQL PL/Perl extension. For your information, the PL/Perl extension is a tool that lets you write database functions in the Perl programming language. An attacker could exploit a weakness in this interaction to manipulate environment variables on the server running the database.
“Incorrect control of environment variables in PostgreSQL PL/Perl allows an unprivileged database user to change sensitive process environment variables (e.g. PATH). That often suffices to enable arbitrary code execution, even if the attacker lacks a database server operating system user.” PostgreSQL explained in the advisory.
Environment variables are like hidden settings that control how programs operate. By altering these variables, an attacker could potentially execute malicious code, eventually stealing data or taking control of the system.
Moreover, environment variables can sometimes hold sensitive details like access keys or file paths. By manipulating these, an attacker could potentially steal valuable information from your database server.
Mitigation strategies include patching your PostgreSQL installation immediately to versions 17.1, 16.5, 15.9, 14.14, 13.17, or 12.21. These updated versions contain the fix for this vulnerability.
Varonis recommends updating PostgreSQL to the latest minor version and restricting allowed extensions. This includes limiting CREATE EXTENSIONS permission grants to specific extensions and setting the shared_preload_libraries configuration parameter to load only required ones. The complete description of the fix is available here.
Furthermore, limit the extensions users can install in your database to prevent attackers from exploiting vulnerabilities and grant users the least privilege to minimize damage.
- Can Vulnerability Scanning Replace Penetration Testing?
- Decade-Old Linux Flaw Exploited for DDoS Attacks on CUPS
- GeoServer Vulnerability Exploited in Global Malware Campaign
- Okta Fixes Critical Vulnerability Allowing Sign-On Policy Bypass
- Veeam Vulnerability Puts Thousands of Backup Servers at Risk
Related news
Red Hat Security Advisory 2024-10750-03 - An update for the postgresql:12 module is now available for Red Hat Enterprise Linux 8.8 Extended Update Support. Issues addressed include a code execution vulnerability.
Red Hat Security Advisory 2024-10739-03 - An update for the postgresql:12 module is now available for Red Hat Enterprise Linux 8.2 Advanced Update Support. Issues addressed include a code execution vulnerability.
Red Hat Security Advisory 2024-10736-03 - An update for the postgresql:15 module is now available for Red Hat Enterprise Linux 9.4 Extended Update Support. Issues addressed include a code execution vulnerability.
Red Hat Security Advisory 2024-10705-03 - An update for the postgresql:12 module is now available for Red Hat Enterprise Linux 8.6 Advanced Mission Critical Update Support, Red Hat Enterprise Linux 8.6 Update Services for SAP Solutions, and Red Hat Enterprise Linux 8.6 Telecommunications Update Service. Issues addressed include a code execution vulnerability.
Ubuntu Security Notice 7132-1 - It was discovered that PostgreSQL incorrectly tracked tables with row security. A remote attacker could possibly use this issue to perform forbidden reads and modifications. Jacob Champion discovered that PostgreSQL clients used untrusted server error messages. An attacker that is able to intercept network communications could possibly use this issue to inject error messages that could be interpreted as valid query results.
Red Hat Security Advisory 2024-10677-03 - An update for the postgresql:13 module is now available for Red Hat Enterprise Linux 8.6 Advanced Mission Critical Update Support, Red Hat Enterprise Linux 8.6 Update Services for SAP Solutions, and Red Hat Enterprise Linux 8.6 Telecommunications Update Service. Issues addressed include a code execution vulnerability.
Debian Linux Security Advisory 5812-1 - Multiple security issues were discovered in PostgreSQL, which may result in the execution of arbitrary code, privilege escalation or log manipulation.
Several versions of PostgreSQL are impacted, and customers will need to upgrade in order to patch.