
Cloud Vulnerability DB
A community-led vulnerabilities database
A security vulnerability was discovered in PostgreSQL's "ALTER ... DEPENDS ON EXTENSION" feature, identified as CVE-2020-1720. The flaw was found where sub-commands did not perform proper authorization checks. This vulnerability affects PostgreSQL versions before 12.2, 11.7, 10.12, and 9.6.17, with versions 9.5 and older not being affected as they didn't support this feature (PostgreSQL News, NVD).
The vulnerability stems from missing authorization checks in the ALTER ... DEPENDS ON EXTENSION sub-commands. The issue received a CVSS v3.1 Base Score of 6.5 (MEDIUM) according to NVD assessment, while Red Hat assessed it with a Base Score of 3.1 (LOW). The vulnerability is classified under CWE-862 (Missing Authorization) and CWE-285 (Improper Authorization) (NVD).
When exploited, this vulnerability allows an authenticated attacker to drop objects such as functions, procedures, materialized views, indexes, or triggers under certain conditions, potentially leading to database corruption. The impact primarily affects database integrity without compromising confidentiality or availability (NVD, PostgreSQL News).
The vulnerability was patched in PostgreSQL versions 12.2, 11.7, 10.12, and 9.6.17. Users are advised to upgrade to these versions or later. The update does not require a database dump and reload; users can simply shutdown PostgreSQL and update its binaries (PostgreSQL News).
Source: This report was generated using AI
Free Vulnerability Assessment
Evaluate your cloud security practices across 9 security domains to benchmark your risk level and identify gaps in your defenses.
Get a personalized demo
"Best User Experience I have ever seen, provides full visibility to cloud workloads."
"Wiz provides a single pane of glass to see what is going on in our cloud environments."
"We know that if Wiz identifies something as critical, it actually is."