{"id":"BIT-postgresql-2024-10979","summary":"PostgreSQL PL/Perl environment variable changes execute arbitrary code","details":"Incorrect control of environment variables in PostgreSQL PL/Perl allows an unprivileged database user to change sensitive process environment variables (e.g. PATH).  That often suffices to enable arbitrary code execution, even if the attacker lacks a database server operating system user.  Versions before PostgreSQL 17.1, 16.5, 15.9, 14.14, 13.17, and 12.21 are affected.","aliases":["CVE-2024-10979"],"modified":"2025-11-06T13:25:46.476Z","published":"2024-11-16T07:16:38.797Z","database_specific":{"cpes":["cpe:2.3:a:postgresql:postgresql:*:*:*:*:*:*:*:*"],"severity":"High"},"references":[{"type":"WEB","url":"https://www.postgresql.org/support/security/CVE-2024-10979/"},{"type":"WEB","url":"https://github.com/fmora50591/postgresql-env-vuln/blob/main/README.md"},{"type":"WEB","url":"https://security.netapp.com/advisory/ntap-20250110-0003/"},{"type":"WEB","url":"https://nvd.nist.gov/vuln/detail/CVE-2024-10979"},{"type":"WEB","url":"https://lists.debian.org/debian-lts-announce/2024/11/msg00011.html"}],"affected":[{"package":{"name":"postgresql","ecosystem":"Bitnami","purl":"pkg:bitnami/postgresql"},"ranges":[{"type":"SEMVER","events":[{"introduced":"0"},{"fixed":"13.17.0"},{"introduced":"14.0.0"},{"fixed":"14.14.0"},{"introduced":"15.0.0"},{"fixed":"15.9.0"},{"introduced":"16.0.0"},{"fixed":"16.5.0"},{"introduced":"17.0.0"},{"fixed":"17.1.0"}]}],"database_specific":{"source":"https://github.com/bitnami/vulndb/tree/main/data/postgresql/BIT-postgresql-2024-10979.json"},"severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"}]}],"schema_version":"1.7.3"}