CVE-2020-14350

Source
https://nvd.nist.gov/vuln/detail/CVE-2020-14350
Import Source
https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2020-14350.json
JSON Data
https://api.osv.dev/v1/vulns/CVE-2020-14350
Aliases
Downstream
Related
Published
2020-08-24T13:15:10Z
Modified
2025-10-10T02:29:24.742912Z
Severity
  • 7.3 (High) CVSS_V3 - CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H CVSS Calculator
Summary
[none]
Details

It was found that some PostgreSQL extensions did not use search_path safely in their installation script. An attacker with sufficient privileges could use this flaw to trick an administrator into executing a specially crafted script, during the installation or update of such extension. This affects PostgreSQL versions before 12.4, before 11.9, before 10.14, before 9.6.19, and before 9.5.23.

References

Affected packages

Git / git.postgresql.org/git/postgresql.git

Affected ranges

Type
GIT
Repo
https://git.postgresql.org/git/postgresql.git
Events
Introduced
cdd4ed5449bf317cc71b45a8deee0173822e7592
Fixed
641d7cf4bc92499fdbf23f3b47112502d5720599

Affected versions

Other

REL9_5_0
REL9_5_1
REL9_5_10
REL9_5_11
REL9_5_12
REL9_5_13
REL9_5_14
REL9_5_15
REL9_5_16
REL9_5_17
REL9_5_18
REL9_5_19
REL9_5_2
REL9_5_20
REL9_5_21
REL9_5_22
REL9_5_3
REL9_5_4
REL9_5_5
REL9_5_6
REL9_5_7
REL9_5_8
REL9_5_9