{"id":"BIT-postgresql-2020-14349","details":"It was found that PostgreSQL versions before 12.4, before 11.9 and before 10.14 did not properly sanitize the search_path during logical replication. An authenticated attacker could use this flaw in an attack similar to CVE-2018-1058, in order to execute arbitrary SQL command in the context of the user used for replication.","aliases":["CVE-2020-14349"],"modified":"2025-04-03T14:40:37.652Z","published":"2024-03-06T11:06:51.679Z","database_specific":{"severity":"High","cpes":["cpe:2.3:a:postgresql:postgresql:*:*:*:*:*:*:*:*"]},"references":[{"type":"WEB","url":"http://lists.opensuse.org/opensuse-security-announce/2020-08/msg00044.html"},{"type":"WEB","url":"http://lists.opensuse.org/opensuse-security-announce/2020-08/msg00049.html"},{"type":"WEB","url":"http://lists.opensuse.org/opensuse-security-announce/2020-08/msg00050.html"},{"type":"WEB","url":"http://lists.opensuse.org/opensuse-security-announce/2020-09/msg00003.html"},{"type":"WEB","url":"http://lists.opensuse.org/opensuse-security-announce/2020-09/msg00008.html"},{"type":"WEB","url":"https://bugzilla.redhat.com/show_bug.cgi?id=1865744"},{"type":"WEB","url":"https://security.gentoo.org/glsa/202008-13"},{"type":"WEB","url":"https://security.netapp.com/advisory/ntap-20200918-0002/"},{"type":"WEB","url":"https://usn.ubuntu.com/4472-1/"},{"type":"WEB","url":"https://nvd.nist.gov/vuln/detail/CVE-2020-14349"}],"affected":[{"package":{"name":"postgresql","ecosystem":"Bitnami","purl":"pkg:bitnami/postgresql"},"ranges":[{"type":"SEMVER","events":[{"introduced":"10.0.0"},{"fixed":"10.14.0"},{"introduced":"11.0.0"},{"fixed":"11.9.0"},{"introduced":"12.0.0"},{"fixed":"12.4.0"}]}],"database_specific":{"source":"https://github.com/bitnami/vulndb/tree/main/data/postgresql/BIT-postgresql-2020-14349.json"},"severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:N/AC:H/PR:L/UI:R/S:U/C:H/I:H/A:H"}]}],"schema_version":"1.7.3"}