Vulnerability Description
In the pg_partman (aka PG Partition Manager) extension before 4.5.1 for PostgreSQL, arbitrary code execution can be achieved via SECURITY DEFINER functions because an explicit search_path is not set.
CVSS Score
CRITICAL
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Pgxn | Pg Partman | < 4.5.1 |
References
- https://github.com/pgpartman/pg_partman/commit/0b6565ad378c358f8a6cd1d48ddc482ebPatchThird Party Advisory
- https://github.com/pgpartman/pg_partman/compare/v4.5.0...v4.5.1PatchThird Party Advisory
- https://security.netapp.com/advisory/ntap-20210625-0006/Third Party Advisory
- https://github.com/pgpartman/pg_partman/commit/0b6565ad378c358f8a6cd1d48ddc482ebPatchThird Party Advisory
- https://github.com/pgpartman/pg_partman/compare/v4.5.0...v4.5.1PatchThird Party Advisory
- https://security.netapp.com/advisory/ntap-20210625-0006/Third Party Advisory
FAQ
What is CVE-2021-33204?
CVE-2021-33204 is a vulnerability with a CVSS score of 9.8 (CRITICAL). In the pg_partman (aka PG Partition Manager) extension before 4.5.1 for PostgreSQL, arbitrary code execution can be achieved via SECURITY DEFINER functions because an explicit search_path is not set.
How severe is CVE-2021-33204?
CVE-2021-33204 has been rated CRITICAL with a CVSS base score of 9.8/10. This is considered a critical vulnerability requiring immediate attention.
Is there a patch for CVE-2021-33204?
Check the references section above for vendor advisories and patch information. Affected products include: Pgxn Pg Partman.