logo
Vulnerability feed
CONTRIBUTE

Vulnerability

warn

CVE-2019-9193

Reference to the description:

https://nvd.nist.gov/vuln/detail/CVE-2019-9193

Description:
In PostgreSQL 9.3 through 11.2, the "COPY TO/FROM PROGRAM" function allows superusers and users in the 'pg_execute_server_program' group to execute arbitrary code in the context of the database's operating system user. This functionality is enabled by default and can be abused to run arbitrary operating system commands on Windows, Linux, and macOS. NOTE: Third parties claim/state this is not an issue because PostgreSQL functionality for ‘COPY TO/FROM PROGRAM’ is acting as intended. References state that in PostgreSQL, a superuser can execute commands as the server user without using the ‘COPY FROM PROGRAM’.
Last updated date:
08/04/2024

Reports

alt

ACTIVELY EXPLOITED

Type:
exploitation
Confidence:
HIGH
Date of publishing:
04/07/2020
Reference url to background

https://otx.alienvault.com/pulse/5e4bb23790c9309ce0c8cb3d/history

Type:
exploitation
Confidence:
HIGH
Date of publishing:
09/22/2021
Type:
exploit
Confidence:
HIGH
Date of publishing:
05/07/2019
Type:
exploit
Confidence:
HIGH
Date of publishing:
02/10/2020
Type:
exploit
Confidence:
HIGH
Date of publishing:
02/12/2020
Type:
exploit
Confidence:
HIGH
Date of publishing:
02/12/2020
Type:
exploit
Confidence:
HIGH
Date of publishing:
01/12/2021
Reference url to background

https://github.com/psauxx/CVE-2019-9193

Type:
exploit
Confidence:
HIGH
Date of publishing:
03/29/2022
Type:
exploit
Confidence:
HIGH
Date of publishing:
10/06/2024
Vulnerability FeedContributorsAboutBlog

@inTheWild

©2024

Privacy Policy