{"dataType":"CVE_RECORD","dataVersion":"5.1","cveMetadata":{"cveId":"CVE-2024-2339","assignerOrgId":"f86ef6dc-4d3a-42ad-8f28-e6d5547a5007","state":"PUBLISHED","assignerShortName":"PostgreSQL","dateReserved":"2024-03-08T19:53:56.153Z","datePublished":"2024-03-08T20:07:14.838Z","dateUpdated":"2024-08-02T19:53:36.167Z"},"containers":{"cna":{"providerMetadata":{"orgId":"f86ef6dc-4d3a-42ad-8f28-e6d5547a5007","shortName":"PostgreSQL","dateUpdated":"2024-03-08T20:07:14.838Z"},"title":"Improper Input Validation in PostgreSQL Anonymizer 1.2 allows table owner to gain superuser privileges via masking rule","descriptions":[{"lang":"en","value":"PostgreSQL Anonymizer v1.2 contains a vulnerability  that allows a user who owns a table to elevate to superuser. A user can define a masking function for a column and place malicious code in that function. When a privileged user applies the masking rules using the static masking or the anonymous dump method, the malicious code is executed and can grant escalated privileges to the malicious user. PostgreSQL Anonymizer v1.2 does provide a protection against this risk with the restrict_to_trusted_schemas option, but that protection is incomplete. Users that don't own a table, especially masked users cannot exploit this vulnerability. The problem is resolved in v1.3."}],"affected":[{"defaultStatus":"unaffected","product":"PostgreSQL Anonymizer","vendor":"DALIBO","versions":[{"lessThan":"1.3.0","status":"affected","version":"1","versionType":"rpm"}]}],"problemTypes":[{"descriptions":[{"lang":"en","cweId":"CWE-20","type":"CWE","description":"Improper Input Validation"}]}],"references":[{"url":"https://gitlab.com/dalibo/postgresql_anonymizer/-/commit/e517b38e62e50871b04011598e73a7308bdae9d9"}],"metrics":[{"format":"CVSS","cvssV3_1":{"version":"3.1","vectorString":"CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:C/C:H/I:H/A:H","baseScore":8,"baseSeverity":"HIGH"}}],"configurations":[{"lang":"en","value":"A user that own a table also has the CREATE permission"}],"workarounds":[{"lang":"en","value":"Revoke the CREATE permission to non-superusers"}],"credits":[{"lang":"en","value":"The PostgreSQL Anonymizer project thanks Pedro Gallegos for reporting this problem."}]},"adp":[{"providerMetadata":{"orgId":"af854a3a-2127-422b-91ae-364da2661108","shortName":"CVE","dateUpdated":"2024-08-01T19:11:53.328Z"},"title":"CVE Program Container","references":[{"url":"https://gitlab.com/dalibo/postgresql_anonymizer/-/commit/e517b38e62e50871b04011598e73a7308bdae9d9","tags":["x_transferred"]}]},{"affected":[{"vendor":"dalibo","product":"postgresql_anonymizer","cpes":["cpe:2.3:a:dalibo:postgresql_anonymizer:*:*:*:*:*:*:*:*"],"defaultStatus":"unknown","versions":[{"version":"1","status":"affected","lessThan":"1.3.0","versionType":"rpm"}]}],"metrics":[{"other":{"type":"ssvc","content":{"timestamp":"2024-08-02T19:52:46.930699Z","id":"CVE-2024-2339","options":[{"Exploitation":"none"},{"Automatable":"no"},{"Technical Impact":"total"}],"role":"CISA Coordinator","version":"2.0.3"}}}],"title":"CISA ADP Vulnrichment","providerMetadata":{"orgId":"134c704f-9b21-4f2e-91b3-4a467353bcc0","shortName":"CISA-ADP","dateUpdated":"2024-08-02T19:53:36.167Z"}}]}}