Privilege escalation via LOAD

Поиск
Список
Период
Сортировка
От John Heasman
Тема Privilege escalation via LOAD
Дата
Msg-id Pine.WNT.4.61.0501211049190.1264@j2
обсуждение исходный текст
Ответы Re: Privilege escalation via LOAD  (Tom Lane <tgl@sss.pgh.pa.us>)
Список pgsql-bugs
Hi guys,

It appears that low privileged users can invoke the LOAD extension to load
arbitrary libraries into the postgres process space.  On Windows systems
this is achieved by calling LoadLibrary
(src/backend/port/dynloader/win32.c).  The effect of this is that DllMain
will be executed.  Since LOAD takes an absolute path, UNC paths may be
used on Windows, thus a low privileged database user can load an arbitrary
library from an anonymous share they have set up, escalating to the
privileges of the database user. I am still investigating the impact on
Unix.

Cheers

John

(this vulnerability was born out of a discussion on #postgresql
between myself, lurka and dennisb).

В списке pgsql-bugs по дате отправления:

Предыдущее
От: "Hendrik Mueller"
Дата:
Сообщение: BUG #1428: SHGetSpecialFolderPath not found in SHELL32.dll
Следующее
От: "Sam Hahn"
Дата:
Сообщение: BUG #1432: type "cube" does not exist