It was found that some PostgreSQL extensions did not use search_path safely in their installation script. An attacker with sufficient privileges could use this flaw to trick an administrator into executing a specially crafted script, during the installation or update of such extension. This affects PostgreSQL versions before 12.4, before 11.9, before 10.14, before 9.6.19, and before 9.5.23.
[
{
"events": [
{
"introduced": "9.5"
},
{
"fixed": "9.5.23"
}
]
},
{
"events": [
{
"introduced": "9.6"
},
{
"fixed": "9.6.19"
}
]
},
{
"events": [
{
"introduced": "10.0"
},
{
"fixed": "10.14"
}
]
},
{
"events": [
{
"introduced": "11.0"
},
{
"fixed": "11.9"
}
]
},
{
"events": [
{
"introduced": "12.0"
},
{
"fixed": "12.4"
}
]
},
{
"events": [
{
"introduced": "0"
},
{
"last_affected": "9.0"
}
]
},
{
"events": [
{
"introduced": "0"
},
{
"last_affected": "15.1"
}
]
},
{
"events": [
{
"introduced": "0"
},
{
"last_affected": "15.2"
}
]
},
{
"events": [
{
"introduced": "0"
},
{
"last_affected": "16.04"
}
]
},
{
"events": [
{
"introduced": "0"
},
{
"last_affected": "18.04"
}
]
},
{
"events": [
{
"introduced": "0"
},
{
"last_affected": "20.04"
}
]
}
]
"https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2020-14350.json"