Re: [EXAMPLE] Overly zealous security of schemas...

Поиск
Список
Период
Сортировка
От Tom Lane
Тема Re: [EXAMPLE] Overly zealous security of schemas...
Дата
Msg-id 18790.1051391865@sss.pgh.pa.us
обсуждение исходный текст
Ответ на [EXAMPLE] Overly zealous security of schemas...  (Sean Chittenden <sean@chittenden.org>)
Ответы Re: [EXAMPLE] Overly zealous security of schemas...
Список pgsql-hackers
Sean Chittenden <sean@chittenden.org> writes:
> Howdy.  It looks as though the checks that allow for access to schemas
> doesn't check the correct permissions of the running user in that if a
> function is being run as the security definer, the schema checks still
> check the session_user.  Am I missing the work around someplace or is
> this a bug?

It looks to me like the bug is not related to the use of a SECURITY
DEFINER function at all, but just to the use of foreign keys.  The
RI triggers know they should setuid to the table owner for execution
of their generated queries --- but they fail to do so for parsing the
queries.  So parse-time security checks (such as USAGE on schemas)
will fail.

I think you can make the same problem happen without a SECURITY DEFINER
function --- what you need is user A inserting into table B, which has
an FK reference to table C, which is in a schema that B's owner has
USAGE rights on but A doesn't.  Would you try it?
        regards, tom lane



В списке pgsql-hackers по дате отправления:

Предыдущее
От: Peter Eisentraut
Дата:
Сообщение: Array access to type "name"
Следующее
От: Sean Chittenden
Дата:
Сообщение: Re: [EXAMPLE] Overly zealous security of schemas...