{"id":"CVE-2020-14350","details":"It was found that some PostgreSQL extensions did not use search_path safely in their installation script. An attacker with sufficient privileges could use this flaw to trick an administrator into executing a specially crafted script, during the installation or update of such extension. This affects PostgreSQL versions before 12.4, before 11.9, before 10.14, before 9.6.19, and before 9.5.23.","aliases":["BIT-postgresql-2020-14350"],"modified":"2026-03-13T00:24:52.313987Z","published":"2020-08-24T13:15:10.967Z","related":["ALSA-2020:5620","MGASA-2020-0365","SUSE-SU-2020:2264-1","SUSE-SU-2020:2265-1","SUSE-SU-2020:2271-1","SUSE-SU-2020:2355-1","SUSE-SU-2020:3464-1","SUSE-SU-2020:3477-1","SUSE-SU-2020:3630-1","openSUSE-SU-2020:1227-1","openSUSE-SU-2020:1228-1","openSUSE-SU-2020:1243-1","openSUSE-SU-2020:1244-1","openSUSE-SU-2020:1312-1","openSUSE-SU-2020:1326-1","openSUSE-SU-2024:11184-1","openSUSE-SU-2024:11185-1","openSUSE-SU-2024:11186-1"],"references":[{"type":"ADVISORY","url":"http://lists.opensuse.org/opensuse-security-announce/2020-09/msg00003.html"},{"type":"ADVISORY","url":"https://security.gentoo.org/glsa/202008-13"},{"type":"ADVISORY","url":"https://security.netapp.com/advisory/ntap-20200918-0002/"},{"type":"ADVISORY","url":"http://lists.opensuse.org/opensuse-security-announce/2020-08/msg00049.html"},{"type":"ADVISORY","url":"http://lists.opensuse.org/opensuse-security-announce/2020-09/msg00008.html"},{"type":"ADVISORY","url":"https://lists.debian.org/debian-lts-announce/2020/08/msg00028.html"},{"type":"ADVISORY","url":"https://usn.ubuntu.com/4472-1/"},{"type":"ADVISORY","url":"http://lists.opensuse.org/opensuse-security-announce/2020-08/msg00043.html"},{"type":"ADVISORY","url":"http://lists.opensuse.org/opensuse-security-announce/2020-08/msg00044.html"},{"type":"ADVISORY","url":"http://lists.opensuse.org/opensuse-security-announce/2020-08/msg00050.html"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=1865746"}],"affected":[{"database_specific":{"source":"https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2020-14350.json","unresolved_ranges":[{"events":[{"introduced":"9.5"},{"fixed":"9.5.23"}]},{"events":[{"introduced":"9.6"},{"fixed":"9.6.19"}]},{"events":[{"introduced":"10.0"},{"fixed":"10.14"}]},{"events":[{"introduced":"11.0"},{"fixed":"11.9"}]},{"events":[{"introduced":"12.0"},{"fixed":"12.4"}]},{"events":[{"introduced":"0"},{"last_affected":"9.0"}]},{"events":[{"introduced":"0"},{"last_affected":"15.1"}]},{"events":[{"introduced":"0"},{"last_affected":"15.2"}]},{"events":[{"introduced":"0"},{"last_affected":"16.04"}]},{"events":[{"introduced":"0"},{"last_affected":"18.04"}]},{"events":[{"introduced":"0"},{"last_affected":"20.04"}]}]}}],"schema_version":"1.7.5","severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H"}]}