CVE-2024-10979
PostgreSQL vulnerability analysis and mitigation

Overview

A critical security vulnerability (CVE-2024-10979) was discovered in PostgreSQL's PL/Perl implementation that affects multiple versions of PostgreSQL. The vulnerability was disclosed on November 14, 2024, and affects PostgreSQL versions before 17.1, 16.5, 15.9, 14.14, 13.17, and 12.21. The issue allows unprivileged database users to manipulate sensitive process environment variables, potentially leading to unauthorized code execution (PostgreSQL Advisory).

Technical details

The vulnerability stems from incorrect control of environment variables in PostgreSQL PL/Perl, which enables unprivileged database users to modify sensitive process environment variables such as PATH. The severity of this vulnerability is rated as HIGH with a CVSS v3.1 base score of 8.8 (Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H). The vulnerability is classified under CWE-610 (Externally Controlled Reference to a Resource in Another Sphere) and CWE-15 (External Control of System or Configuration Setting) (NVD, PostgreSQL Advisory).

Impact

The exploitation of this vulnerability can lead to severe consequences including arbitrary code execution, even without having operating system user access to the database server. The impact includes potential disclosure of sensitive information, unauthorized modification of data, and possible Denial of Service (DoS). The vulnerability's high severity rating indicates significant risks to system confidentiality, integrity, and availability (NetApp Advisory).

Mitigation and workarounds

The primary mitigation is to upgrade to the fixed versions: PostgreSQL 17.1, 16.5, 15.9, 14.14, 13.17, or 12.21 or later. Additional security measures include restricting permissions for creating PL/Perl functions to trusted users only, implementing proper environment variable sanitization, and regularly auditing database functions to detect potential exploitation attempts (PostgreSQL Advisory).

Additional resources


SourceThis report was generated using AI

Free Vulnerability Assessment

Benchmark your Cloud Security Posture

Evaluate your cloud security practices across 9 security domains to benchmark your risk level and identify gaps in your defenses.

Request assessment

Get a personalized demo

Ready to see Wiz in action?

“Best User Experience I have ever seen, provides full visibility to cloud workloads.”
David EstlickCISO
“Wiz provides a single pane of glass to see what is going on in our cloud environments.”
Adam FletcherChief Security Officer
“We know that if Wiz identifies something as critical, it actually is.”
Greg PoniatowskiHead of Threat and Vulnerability Management