Select your cookie preferences

We use cookies and similar tools to enhance your experience, provide our services, deliver relevant advertising, and make improvements. Approved third parties also use these tools to help us deliver advertising and provide certain site features.

CVE-2024-0985

Public on 2024-02-08
Modified on 2024-02-10
Description

Late privilege drop in REFRESH MATERIALIZED VIEW CONCURRENTLY in PostgreSQL allows an object creator to execute arbitrary SQL functions as the command issuer. The command intends to run SQL functions as the owner of the materialized view, enabling safe refresh of untrusted materialized views. The victim is a superuser or member of one of the attacker's roles. The attack requires luring the victim into running REFRESH MATERIALIZED VIEW CONCURRENTLY on the attacker's materialized view. As part of exploiting this vulnerability, the attacker creates functions that use CREATE RULE to convert the internally-built temporary table to a view. Versions before PostgreSQL 15.6, 14.11, 13.14, and 12.18 are affected. The only known exploit does not work in PostgreSQL 16 and later. For defense in depth, PostgreSQL 16.2 adds the protections that older branches are using to fix their vulnerability.

Severity
Important
See what this means
CVSS v3 Base Score
8.0
See breakdown
Continue reading

Affected Packages

Platform Package Release Date Advisory
Amazon Linux 2 - Postgresql12 Extra libpq 2024-02-29 00:57 ALAS2POSTGRESQL12-2024-009
Amazon Linux 2 - Postgresql14 Extra libpq 2024-02-29 00:57 ALAS2POSTGRESQL14-2024-007
Amazon Linux 2 - Postgresql12 Extra postgresql 2024-02-29 00:57 ALAS2POSTGRESQL12-2024-008
Amazon Linux 2 - Postgresql13 Extra postgresql 2024-02-29 00:57 ALAS2POSTGRESQL13-2024-006
Amazon Linux 2 - Postgresql14 Extra postgresql 2024-02-29 00:57 ALAS2POSTGRESQL14-2024-006
Amazon Linux 2023 postgresql15 2024-02-29 10:29 ALAS2023-2024-547

CVSS Scores

Score Type Score Vector
Amazon Linux CVSSv3 8.0 CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H
NVD CVSSv3 8.0 CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H