← Voltar para CVEs
CVE-2019-10128
HIGH7.8
Descricao
A vulnerability was found in postgresql versions 11.x prior to 11.3. The Windows installer for EnterpriseDB-supplied PostgreSQL does not lock down the ACL of the binary installation directory or the ACL of the data directory; it keeps the inherited ACL. In the default configuration, this allows a local attacker to read arbitrary data directory files, essentially bypassing database-imposed read access limitations. In plausible non-default configurations, an attacker having both an unprivileged Windows account and an unprivileged PostgreSQL account can cause the PostgreSQL service account to execute arbitrary code.
Detalhes CVE
Pontuacao CVSS v3.17.8
SeveridadeHIGH
Vetor CVSSCVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
Vetor de ataqueLOCAL
ComplexidadeLOW
Privilegios necessariosLOW
Interacao do usuarioNONE
Publicado3/19/2021
Ultima modificacao11/21/2024
Fontenvd
Avistamentos honeypot0
Produtos afetados
microsoft:windowspostgresql:postgresql
Fraquezas (CWE)
CWE-284
Referencias
https://bugzilla.redhat.com/show_bug.cgi?id=1707102(secalert@redhat.com)
https://security.netapp.com/advisory/ntap-20210430-0004/(secalert@redhat.com)
https://www.postgresql.org/about/news/1939/(secalert@redhat.com)
https://bugzilla.redhat.com/show_bug.cgi?id=1707102(af854a3a-2127-422b-91ae-364da2661108)
https://security.netapp.com/advisory/ntap-20210430-0004/(af854a3a-2127-422b-91ae-364da2661108)
https://www.postgresql.org/about/news/1939/(af854a3a-2127-422b-91ae-364da2661108)
Correlacoes IOC
Sem correlacoes registradas
This product uses data from the NVD API but is not endorsed or certified by the NVD.