CVE-2024-10979 — External Control of System or Configuration Setting in Postgresql
Severity
8.8HIGHNVD
OSV5.4
EPSS
6.9%
top 8.61%
CISA KEV
Not in KEV
Exploit
No known exploits
Affected products
Timeline
PublishedNov 14
Latest updateMar 19
Description
Incorrect control of environment variables in PostgreSQL PL/Perl allows an unprivileged database user to change sensitive process environment variables (e.g. PATH). That often suffices to enable arbitrary code execution, even if the attacker lacks a database server operating system user. Versions before PostgreSQL 17.1, 16.5, 15.9, 14.14, 13.17, and 12.21 are affected.
CVSS vector
CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:HExploitability: 2.8 | Impact: 5.9
Affected Packages9 packages
🔴Vulnerability Details
5OSV▶
CVE-2024-10979: Incorrect control of environment variables in PostgreSQL PL/Perl allows an unprivileged database user to change sensitive process environment variable↗2024-11-14
GHSA▶
GHSA-2r9h-x757-8j9q: Incorrect control of environment variables in PostgreSQL PL/Perl allows an unprivileged database user to change sensitive process environment variable↗2024-11-14
📋Vendor Advisories
5Red Hat
▶
Debian▶
CVE-2024-10979: postgresql-13 - Incorrect control of environment variables in PostgreSQL PL/Perl allows an unpri...↗2024