CVE-2022-1552
postgresql: Autovacuum, REINDEX, and others omit "security restricted operation" sandbox
Severity Score
Exploit Likelihood
Affected Versions
Public Exploits
0Exploited in Wild
-Decision
Descriptions
A flaw was found in PostgreSQL. There is an issue with incomplete efforts to operate safely when a privileged user is maintaining another user's objects. The Autovacuum, REINDEX, CREATE INDEX, REFRESH MATERIALIZED VIEW, CLUSTER, and pg_amcheck commands activated relevant protections too late or not at all during the process. This flaw allows an attacker with permission to create non-temporary objects in at least one schema to execute arbitrary SQL functions under a superuser identity.
Se ha encontrado un fallo en PostgreSQL. Se presenta un problema de esfuerzos incompletos para operar de forma segura cuando un usuario privilegiado está manteniendo los objetos de otro usuario. Los comandos Autovacuum, REINDEX, CREATE INDEX, REFRESH MATERIALIZED VIEW, CLUSTER y pg_amcheck activan las protecciones pertinentes demasiado tarde o no las activan en absoluto durante el proceso. Este fallo permite a un atacante con permiso para crear objetos no temporales en al menos un esquema ejecutar funciones SQL arbitrarias bajo una identidad de superusuario
CVSS Scores
SSVC
- Decision:-
Timeline
- 2022-05-02 CVE Reserved
- 2022-05-24 CVE Published
- 2024-05-05 EPSS Updated
- 2024-08-03 CVE Updated
- ---------- Exploited in Wild
- ---------- KEV Due Date
- ---------- First Exploit
CWE
- CWE-89: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')
- CWE-459: Incomplete Cleanup
CAPEC
References (6)
URL | Tag | Source |
---|---|---|
https://security.netapp.com/advisory/ntap-20221104-0005 | Third Party Advisory |
URL | Date | SRC |
---|
URL | Date | SRC |
---|---|---|
https://bugzilla.redhat.com/show_bug.cgi?id=2081126 | 2022-06-22 |
URL | Date | SRC |
---|---|---|
https://access.redhat.com/security/cve/CVE-2022-1552 | 2022-06-22 | |
https://security.gentoo.org/glsa/202211-04 | 2023-11-07 | |
https://www.postgresql.org/about/news/postgresql-143-137-1211-1116-and-1021-released-2449 | 2023-11-07 | |
https://www.postgresql.org/support/security/CVE-2022-1552 | 2023-11-07 |
Affected Vendors, Products, and Versions
Vendor | Product | Version | Other | Status | ||||||
---|---|---|---|---|---|---|---|---|---|---|
Vendor | Product | Version | Other | Status | <-- --> | Vendor | Product | Version | Other | Status |
Postgresql Search vendor "Postgresql" | Postgresql Search vendor "Postgresql" for product "Postgresql" | >= 10.0 < 10.21 Search vendor "Postgresql" for product "Postgresql" and version " >= 10.0 < 10.21" | - |
Affected
| ||||||
Postgresql Search vendor "Postgresql" | Postgresql Search vendor "Postgresql" for product "Postgresql" | >= 11.0 < 11.16 Search vendor "Postgresql" for product "Postgresql" and version " >= 11.0 < 11.16" | - |
Affected
| ||||||
Postgresql Search vendor "Postgresql" | Postgresql Search vendor "Postgresql" for product "Postgresql" | >= 12.0 < 12.11 Search vendor "Postgresql" for product "Postgresql" and version " >= 12.0 < 12.11" | - |
Affected
| ||||||
Postgresql Search vendor "Postgresql" | Postgresql Search vendor "Postgresql" for product "Postgresql" | >= 13.0 < 13.7 Search vendor "Postgresql" for product "Postgresql" and version " >= 13.0 < 13.7" | - |
Affected
| ||||||
Postgresql Search vendor "Postgresql" | Postgresql Search vendor "Postgresql" for product "Postgresql" | >= 14.0 < 14.3 Search vendor "Postgresql" for product "Postgresql" and version " >= 14.0 < 14.3" | - |
Affected
|