Vulnerability Description
The PL/php add-on 1.4 and earlier for PostgreSQL does not properly protect script execution by a different SQL user identity within the same session, which allows remote authenticated users to gain privileges via crafted script code in a SECURITY DEFINER function, a related issue to CVE-2010-3433.
CVSS Score
MEDIUM
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Alvaro Herrera | Pl\/Php | <= 1.4 |
| Postgresql | Postgresql | All versions |
Related Weaknesses (CWE)
References
- http://www.postgresql.org/about/news.1244
- http://www.postgresql.org/docs/9.0/static/release-9-0-1.html
- https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3
- http://www.postgresql.org/about/news.1244
- http://www.postgresql.org/docs/9.0/static/release-9-0-1.html
- https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3
FAQ
What is CVE-2010-3781?
CVE-2010-3781 is a vulnerability with a CVSS score of 6.0 (MEDIUM). The PL/php add-on 1.4 and earlier for PostgreSQL does not properly protect script execution by a different SQL user identity within the same session, which allows remote authenticated users to gain pr...
How severe is CVE-2010-3781?
CVE-2010-3781 has been rated MEDIUM with a CVSS base score of 6.0/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2010-3781?
Check the references section above for vendor advisories and patch information. Affected products include: Alvaro Herrera Pl\/Php, Postgresql Postgresql.