CVE-2024-4317

May 14, 2024, 4:11 p.m.

Awaiting Analysis
CVE has been marked for Analysis. Normally once in this state the CVE will be analyzed by NVD staff within 24 hours.

Products

PostgreSQL

  • 14.0 - 16.2

Source

f86ef6dc-4d3a-42ad-8f28-e6d5547a5007

Tags

CVE-2024-4317 details

Published : May 14, 2024, 3:43 p.m.
Last Modified : May 14, 2024, 4:11 p.m.

Description

Missing authorization in PostgreSQL built-in views pg_stats_ext and pg_stats_ext_exprs allows an unprivileged database user to read most common values and other statistics from CREATE STATISTICS commands of other users. The most common values may reveal column values the eavesdropper could not otherwise read or results of functions they cannot execute. Installing an unaffected version only fixes fresh PostgreSQL installations, namely those that are created with the initdb utility after installing that version. Current PostgreSQL installations will remain vulnerable until they follow the instructions in the release notes. Within major versions 14-16, minor versions before PostgreSQL 16.3, 15.7, and 14.12 are affected. Versions before PostgreSQL 14 are unaffected.

CVSS Score

1 2 3.1 4 5 6 7 8 9 10

Weakness

Weakness Name Description

CVSS Data

Attack Vector

NETWORK

Attack Complexity

HIGH

Privileges Required

LOW

Scope

UNCHANGED

Confidentiality Impact

LOW

Integrity Impact

NONE

Availability Impact

NONE

Base Score

3.1

Exploitability Score

Impact Score

Base Severity

LOW

References

URL Source
https://www.postgresql.org/support/security/CVE-2024-4317/ f86ef6dc-4d3a-42ad-8f28-e6d5547a5007
This website uses the NVD API, but is not approved or certified by it.