Re: leaky views, yet again

Поиск
Список
Период
Сортировка
От Stephen Frost
Тема Re: leaky views, yet again
Дата
Msg-id 20101007131022.GQ26232@tamriel.snowman.net
обсуждение исходный текст
Ответ на Re: leaky views, yet again  (Robert Haas <robertmhaas@gmail.com>)
Ответы Re: leaky views, yet again  (Heikki Linnakangas <heikki.linnakangas@enterprisedb.com>)
Re: leaky views, yet again  (Robert Haas <robertmhaas@gmail.com>)
Список pgsql-hackers
* Robert Haas (robertmhaas@gmail.com) wrote:
> On Thu, Oct 7, 2010 at 2:02 AM, Heikki Linnakangas
> > Looks good. It gives the impression that you need to be able to a create
> > custom function to exploit, though. It would be good to mention that
> > internal functions can be used too, revoking access to CREATE FUNCTION does
> > not make you safe.
>
> OK, second try attached.

This might be overly pedantic, but I don't think 'tampering' gives the
right impression.  Also, there's a marked difference between viewing
data by using built-ins such as casting (since you'll only get to see
the first value in a column that fails the cast) and being able to write
a function that pulls out every row of the table and dumps it into
another table.  I think it'd have a much bigger impression if you went
ahead and changed the 'raise notice' to an 'insert into table x;'.

Also, even if you can't create functions (due to lack of create
privileges on any schema), you could use DO clauses now.  Revoking
usage rights on all languages should prevent both though.
Thanks,
    Stephen

В списке pgsql-hackers по дате отправления:

Предыдущее
От: Fujii Masao
Дата:
Сообщение: Re: Sync Rep at Oct 5
Следующее
От: Andrew Dunstan
Дата:
Сообщение: Re: Git cvsserver serious issue