Risk | Low |
Patch available | YES |
Number of vulnerabilities | 2 |
CVE-ID | CVE-2021-3393 CVE-2021-20229 |
CWE-ID | CWE-200 CWE-264 |
Exploitation vector | Network |
Public exploit | N/A |
Vulnerable software |
PostgreSQL Server applications / Database software |
Vendor | PostgreSQL Global Development Group |
Security Bulletin
This security bulletin contains information about 2 vulnerabilities.
EUVDB-ID: #VU50655
Risk: Low
CVSSv4.0: 1.3 [CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:L/VI:N/VA:N/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2021-3393
CWE-ID:
CWE-200 - Information exposure
Exploit availability: No
DescriptionThe vulnerability allows a remote user to gain access to potentially sensitive information.
The vulnerability exists due to excessive data output in the error message. A remote user having an UPDATE
privilege on a partitioned table but lacking the
SELECT
privilege on some column may be able to acquire denied-column values
from an error message. This vulnerability is similar to #VU30418.
Install updates from vendor's website.
Vulnerable software versionsPostgreSQL: 11.0 - 13.1
CPE2.3 External linkshttps://www.postgresql.org/about/news/postgresql-132-126-1111-1016-9621-and-9525-released-2165/
Q & A
Can this vulnerability be exploited remotely?
Yes. This vulnerability can be exploited by a remote authenticated user via the Internet.
How the attacker can exploit this vulnerability?
The attacker would have to send a specially crafted request to the affected application in order to exploit this vulnerability.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU50656
Risk: Low
CVSSv4.0: 1.3 [CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:L/VI:N/VA:N/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2021-20229
CWE-ID:
CWE-264 - Permissions, Privileges, and Access Controls
Exploit availability: No
DescriptionThe vulnerability allows a remote user to gain access to sensitive information.
The vulnerability exists due to application does not properly impose security restrictions. A user having a SELECT
privilege on an individual column can craft a special
query that returns all columns of the table. Additionally, a stored view that uses column-level privileges will have
incomplete column-usage bitmaps. In installations that depend on column-level
permissions for security, it is recommended to execute CREATE OR REPLACE
on
all user-defined views to force them to be re-parsed.
Install updates from vendor's website.
Vulnerable software versionsPostgreSQL: 13.0 - 13.1
CPE2.3https://www.postgresql.org/about/news/postgresql-132-126-1111-1016-9621-and-9525-released-2165/
Q & A
Can this vulnerability be exploited remotely?
Yes. This vulnerability can be exploited by a remote authenticated user via the Internet.
How the attacker can exploit this vulnerability?
The attacker would have to send a specially crafted request to the affected application in order to exploit this vulnerability.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.