PostgreSQL up to 8.2.10 Access Restriction Safe::reval access control
| CVSS Meta Temp Score | Current Exploit Price (≈) | CTI Interest Score |
|---|---|---|
| 9.5 | $0-$5k | 0.00 |
Summary
A vulnerability, which was classified as critical, was found in PostgreSQL up to 8.2.10. The impacted element is the function Safe::reval of the component Access Restriction. Such manipulation leads to access control.
This vulnerability is listed as CVE-2010-1447. There is no available exploit.
You should upgrade the affected component.
Details
A vulnerability was found in PostgreSQL up to 8.2.10 (Database Software) and classified as critical. Affected by this issue is the function Safe::reval of the component Access Restriction. The manipulation with an unknown input leads to a access control vulnerability. Using CWE to declare the problem leads to CWE-264. Impacted is confidentiality, integrity, and availability. CVE summarizes:
The Safe (aka Safe.pm) module 2.26, and certain earlier versions, for Perl, as used in PostgreSQL 7.4 before 7.4.29, 8.0 before 8.0.25, 8.1 before 8.1.21, 8.2 before 8.2.17, 8.3 before 8.3.11, 8.4 before 8.4.4, and 9.0 Beta before 9.0 Beta 2, allows context-dependent attackers to bypass intended (1) Safe::reval and (2) Safe::rdo access restrictions, and inject and execute arbitrary code, via vectors involving subroutine references and delayed execution.
The weakness was presented 05/18/2010 (Website). The advisory is available at vupen.com. This vulnerability is handled as CVE-2010-1447. The attack may be launched remotely. A simple authentication is required for exploitation. Technical details are known, but there is no available exploit. This vulnerability is assigned to T1068 by the MITRE ATT&CK project.
The vulnerability scanner Nessus provides a plugin with the ID 55487 (Debian DSA-2267-1 : perl - restriction bypass), which helps to determine the existence of the flaw in a target environment. It is assigned to the family Debian Local Security Checks. The commercial vulnerability scanner Qualys is able to test this issue with plugin 216027 (VMware ESX 4.0 Third Party Updates for Service Console (VMSA-2010-0013)).
Upgrading to version 8.2.11 eliminates this vulnerability.
The vulnerability is also documented in the databases at X-Force (58737), Tenable (55487), SecurityFocus (BID 40305†), OSVDB (64756†) and Vulnerability Center (SBV-25922†). See VDB-27518, VDB-53742, VDB-53701 and VDB-53256 for similar entries. If you want to get best quality of vulnerability data, you may have to visit VulDB.
Product
Type
Name
Version
License
Website
- Product: https://www.postgresql.org/
CPE 2.3
CPE 2.2
CVSSv4
VulDB Vector: 🔍VulDB Reliability: 🔍
CVSSv3
VulDB Meta Base Score: 9.9VulDB Meta Temp Score: 9.5
VulDB Base Score: 9.9
VulDB Temp Score: 9.5
VulDB Vector: 🔍
VulDB Reliability: 🔍
CVSSv2
| AV | AC | Au | C | I | A |
|---|---|---|---|---|---|
| 💳 | 💳 | 💳 | 💳 | 💳 | 💳 |
| 💳 | 💳 | 💳 | 💳 | 💳 | 💳 |
| 💳 | 💳 | 💳 | 💳 | 💳 | 💳 |
| Vector | Complexity | Authentication | Confidentiality | Integrity | Availability |
|---|---|---|---|---|---|
| Unlock | Unlock | Unlock | Unlock | Unlock | Unlock |
| Unlock | Unlock | Unlock | Unlock | Unlock | Unlock |
| Unlock | Unlock | Unlock | Unlock | Unlock | Unlock |
VulDB Base Score: 🔍
VulDB Temp Score: 🔍
VulDB Reliability: 🔍
NVD Base Score: 🔍
Exploiting
Class: Access controlCWE: CWE-264
CAPEC: 🔍
ATT&CK: 🔍
Physical: No
Local: No
Remote: Yes
Availability: 🔍
Status: Not defined
EPSS Score: 🔍
EPSS Percentile: 🔍
Price Prediction: 🔍
Current Price Estimation: 🔍
| 0-Day | Unlock | Unlock | Unlock | Unlock |
|---|---|---|---|---|
| Today | Unlock | Unlock | Unlock | Unlock |
Nessus ID: 55487
Nessus Name: Debian DSA-2267-1 : perl - restriction bypass
Nessus File: 🔍
Nessus Risk: 🔍
Nessus Family: 🔍
Nessus Port: 🔍
OpenVAS ID: 69974
OpenVAS Name: Debian Security Advisory DSA 2267-1 (perl)
OpenVAS File: 🔍
OpenVAS Family: 🔍
Qualys ID: 🔍
Qualys Name: 🔍
Threat Intelligence
Interest: 🔍Active Actors: 🔍
Active APT Groups: 🔍
Countermeasures
Recommended: UpgradeStatus: 🔍
0-Day Time: 🔍
Upgrade: PostgreSQL 8.2.11
Timeline
04/15/2010 🔍04/29/2010 🔍
04/29/2010 🔍
05/18/2010 🔍
05/18/2010 🔍
05/19/2010 🔍
06/01/2010 🔍
07/05/2011 🔍
03/19/2015 🔍
09/13/2021 🔍
Sources
Product: postgresql.orgAdvisory: DSA-2267⛔
Status: Confirmed
Confirmation: 🔍
CVE: CVE-2010-1447 (🔍)
GCVE (CVE): GCVE-0-2010-1447
GCVE (VulDB): GCVE-100-53258
OVAL: 🔍
IAVM: 🔍
X-Force: 58737
SecurityFocus: 40305 - Perl Safe Module 'reval()' and 'rdo()' CVE-2010-1447 Restriction-Bypass Vulnerabilities
Secunia: 39845
OSVDB: 64756 - PostgreSQL Safe Module PL / perl Procedure Restriction Weakness Arbitrary Perl Code Execution (2010-1447)
Vulnerability Center: 25922 - PostgreSQL Safe Module Remote Arbitrary Perl Code Execution Vulnerability via a Crafted Script, High
See also: 🔍
Entry
Created: 03/19/2015 12:22Updated: 09/13/2021 23:55
Changes: 03/19/2015 12:22 (71), 02/27/2017 09:31 (8), 09/13/2021 23:29 (6), 09/13/2021 23:44 (1), 09/13/2021 23:55 (2)
Complete: 🔍
Cache ID: 216:B93:103
If you want to get best quality of vulnerability data, you may have to visit VulDB.
No comments yet. Languages: en.
Please log in to comment.