Re: BUG #13651: trigger security invoker attack

Поиск
Список
Период
Сортировка
От David G. Johnston
Тема Re: BUG #13651: trigger security invoker attack
Дата
Msg-id CAKFQuwbRFFSMy_0xxGe75MR4XBrCm+rbogug6hrVx044obkMEA@mail.gmail.com
обсуждение исходный текст
Ответ на BUG #13651: trigger security invoker attack  (digoal@126.com)
Ответы Re: BUG #13651: trigger security invoker attack  (德哥 <digoal@126.com>)
Re: BUG #13651: trigger security invoker attack  (德哥 <digoal@126.com>)
Список pgsql-bugs
On Tuesday, September 29, 2015, =E5=BE=B7=E5=93=A5 <digoal@126.com> wrote:

> I hope this :
>     Nonsuperuser cann't CREATE | ALTER security invoker Functions.
>

In that case don't hold your breath.  Besides, your rules-based spoofing
doesn't actually have this problem since the rule owner is the invoker, not
the original user.  And I'm still confused regarding your original post and
how it describes an active risk.  Your second example is also flawed as
it requires superuser permissions to work.

Security invoker are safe because the caller cannot do anything they
couldn't otherwise do.  That doesn't mean they should treat the code as
trusted or a black-box.

Do you have a suggestion that doesn't amount to scraping the whole thing
and staring over?

David J.

В списке pgsql-bugs по дате отправления:

Предыдущее
От: "David G. Johnston"
Дата:
Сообщение: Re: BUG #13651: trigger security invoker attack
Следующее
От: "David G. Johnston"
Дата:
Сообщение: Re: BUG #13651: trigger security invoker attack