CVE-2017-15099

INSERT ... ON CONFLICT DO UPDATE commands in PostgreSQL 10.x before 10.1, 9.6.x before 9.6.6, and 9.5.x before 9.5.10 disclose table contents that the invoker lacks privilege to read. These exploits affect only tables where the attacker lacks full read access but has both INSERT and UPDATE privileges. Exploits bypass row level security policies and lack of SELECT privilege.
Configurations

Configuration 1 (hide)

OR cpe:2.3:a:postgresql:postgresql:9.5:*:*:*:*:*:*:*
cpe:2.3:a:postgresql:postgresql:9.5.1:*:*:*:*:*:*:*
cpe:2.3:a:postgresql:postgresql:9.5.2:*:*:*:*:*:*:*
cpe:2.3:a:postgresql:postgresql:9.5.3:*:*:*:*:*:*:*
cpe:2.3:a:postgresql:postgresql:9.5.4:*:*:*:*:*:*:*
cpe:2.3:a:postgresql:postgresql:9.5.5:*:*:*:*:*:*:*
cpe:2.3:a:postgresql:postgresql:9.5.6:*:*:*:*:*:*:*
cpe:2.3:a:postgresql:postgresql:9.5.7:*:*:*:*:*:*:*
cpe:2.3:a:postgresql:postgresql:9.5.8:*:*:*:*:*:*:*
cpe:2.3:a:postgresql:postgresql:9.5.9:*:*:*:*:*:*:*
cpe:2.3:a:postgresql:postgresql:9.6:*:*:*:*:*:*:*
cpe:2.3:a:postgresql:postgresql:9.6.1:*:*:*:*:*:*:*
cpe:2.3:a:postgresql:postgresql:9.6.2:*:*:*:*:*:*:*
cpe:2.3:a:postgresql:postgresql:9.6.3:*:*:*:*:*:*:*
cpe:2.3:a:postgresql:postgresql:9.6.4:*:*:*:*:*:*:*
cpe:2.3:a:postgresql:postgresql:9.6.5:*:*:*:*:*:*:*
cpe:2.3:a:postgresql:postgresql:10.0:*:*:*:*:*:*:*

Configuration 2 (hide)

cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*

History

21 Nov 2024, 03:14

Type Values Removed Values Added
References () http://www.securityfocus.com/bid/101781 - Third Party Advisory, VDB Entry () http://www.securityfocus.com/bid/101781 - Third Party Advisory, VDB Entry
References () http://www.securitytracker.com/id/1039752 - Third Party Advisory, VDB Entry () http://www.securitytracker.com/id/1039752 - Third Party Advisory, VDB Entry
References () https://access.redhat.com/errata/RHSA-2018:2511 - () https://access.redhat.com/errata/RHSA-2018:2511 -
References () https://access.redhat.com/errata/RHSA-2018:2566 - () https://access.redhat.com/errata/RHSA-2018:2566 -
References () https://www.debian.org/security/2017/dsa-4028 - Issue Tracking, Third Party Advisory () https://www.debian.org/security/2017/dsa-4028 - Issue Tracking, Third Party Advisory
References () https://www.postgresql.org/about/news/1801/ - Issue Tracking, Vendor Advisory () https://www.postgresql.org/about/news/1801/ - Issue Tracking, Vendor Advisory
References () https://www.postgresql.org/support/security/ - Issue Tracking, Vendor Advisory () https://www.postgresql.org/support/security/ - Issue Tracking, Vendor Advisory

Information

Published : 2017-11-22 18:29

Updated : 2025-04-20 01:37


NVD link : CVE-2017-15099

Mitre link : CVE-2017-15099

CVE.ORG link : CVE-2017-15099


JSON object : View

Products Affected

debian

  • debian_linux

postgresql

  • postgresql
CWE
CWE-200

Exposure of Sensitive Information to an Unauthorized Actor