Vulnerability Description
An issue was discovered in EnterpriseDB Postgres Advanced Server (EPAS) before 11.21.32, 12.x before 12.16.20, 13.x before 13.12.16, 14.x before 14.9.0, and 15.x before 15.4.0. It contains the functions get_url_as_text and get_url_as_bytea that are publicly executable, thus permitting an authenticated user to read any file from the local filesystem or remote system regardless of that user's permissions.
CVSS Score
MEDIUM
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Enterprisedb | Postgres Advanced Server | < 11.21.32 |
References
- https://www.enterprisedb.com/docs/security/advisories/cve202341114/Vendor Advisory
- https://www.enterprisedb.com/docs/security/advisories/cve202341114/Vendor Advisory
FAQ
What is CVE-2023-41114?
CVE-2023-41114 is a vulnerability with a CVSS score of 6.5 (MEDIUM). An issue was discovered in EnterpriseDB Postgres Advanced Server (EPAS) before 11.21.32, 12.x before 12.16.20, 13.x before 13.12.16, 14.x before 14.9.0, and 15.x before 15.4.0. It contains the functio...
How severe is CVE-2023-41114?
CVE-2023-41114 has been rated MEDIUM with a CVSS base score of 6.5/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2023-41114?
Check the references section above for vendor advisories and patch information. Affected products include: Enterprisedb Postgres Advanced Server.