CVE-2018-1058
Severity
8.8HIGH
EPSS
82.7%
top 0.76%
CISA KEV
Not in KEV
Exploit
No known exploits
Affected products
Timeline
PublishedMar 2
Latest updateMay 13
Description
A flaw was found in the way Postgresql allowed a user to modify the behavior of a query for other users. An attacker with a user account could use this flaw to execute code with the permissions of superuser in the database. Versions 9.3 through 10 are affected.
CVSS vector
CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:HExploitability: 2.8 | Impact: 5.9
Affected Packages7 packages
Also affects: Ubuntu Linux 14.04, 16.04, 17.10
🔴Vulnerability Details
3GHSA▶
GHSA-wj3f-f94q-2r98: A flaw was found in the way Postgresql allowed a user to modify the behavior of a query for other users↗2022-05-13
CVEList▶
CVE-2018-1058: A flaw was found in the way Postgresql allowed a user to modify the behavior of a query for other users↗2018-03-02
OSV▶
CVE-2018-1058: A flaw was found in the way Postgresql allowed a user to modify the behavior of a query for other users↗2018-03-02
📋Vendor Advisories
4Microsoft▶
It was found that PostgreSQL versions before 12.4 before 11.9 and before 10.14 did not properly sanitize the search_path during logical replication. An authenticated attacker could use this flaw in an↗2020-08-11
Red Hat
▶
💬Community
5Bugzilla
▶
Bugzilla▶
CVE-2018-1058 postgresql: Uncontrolled search path element in pg_dump and other client applications [fedora-all]↗2018-03-02
Bugzilla▶
CVE-2018-1058 mingw-postgresql: postgresql: Uncontrolled search path element in pg_dump and other client applications [fedora-all]↗2018-03-02
Bugzilla▶
CVE-2018-1058 mingw-postgresql: postgresql: Uncontrolled search path element in pg_dump and other client applications [epel-7]↗2018-03-02
Bugzilla▶
CVE-2018-1058 postgresql: Uncontrolled search path element in pg_dump and other client applications↗2018-02-20