8.8
CVE-2020-25695
- EPSS 23.34%
- Published 16.11.2020 01:15:12
- Last modified 21.11.2024 05:18:29
- Source secalert@redhat.com
- Teams watchlist Login
- Open Login
A flaw was found in PostgreSQL versions before 13.1, before 12.5, before 11.10, before 10.15, before 9.6.20 and before 9.5.24. An attacker having permission to create non-temporary objects in at least one schema can execute arbitrary SQL functions under the identity of a superuser. The highest threat from this vulnerability is to data confidentiality and integrity as well as system availability.
Data is provided by the National Vulnerability Database (NVD)
Postgresql ≫ Postgresql Version < 9.5.24
Postgresql ≫ Postgresql Version >= 9.6.0 < 9.6.20
Postgresql ≫ Postgresql Version >= 10.0 < 10.15
Postgresql ≫ Postgresql Version >= 11.0 < 11.10
Postgresql ≫ Postgresql Version >= 12.0 < 12.5
Postgresql ≫ Postgresql Version >= 13.0 < 13.1
Debian ≫ Debian Linux Version9.0
Zu dieser CVE wurde keine CISA KEV oder CERT.AT-Warnung gefunden.
Type | Source | Score | Percentile |
---|---|---|---|
EPSS | FIRST.org | 23.34% | 0.954 |
Source | Base Score | Exploit Score | Impact Score | Vector string |
---|---|---|---|---|
nvd@nist.gov | 8.8 | 2.8 | 5.9 |
CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
|
nvd@nist.gov | 6.5 | 8 | 6.4 |
AV:N/AC:L/Au:S/C:P/I:P/A:P
|
CWE-89 Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')
The product constructs all or part of an SQL command using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify the intended SQL command when it is sent to a downstream component. Without sufficient removal or quoting of SQL syntax in user-controllable inputs, the generated SQL query can cause those inputs to be interpreted as SQL instead of ordinary user data.