CVE Vulnerabilities

CVE-2023-39418

Insufficient Granularity of Access Control

Published: Aug 11, 2023 | Modified: Dec 06, 2024
CVSS 3.x
4.3
MEDIUM
Source:
NVD
CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N
CVSS 2.x
RedHat/V2
RedHat/V3
3.1 LOW
CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:N/I:L/A:N
Ubuntu
MEDIUM

A vulnerability was found in PostgreSQL with the use of the MERGE command, which fails to test new rows against row security policies defined for UPDATE and SELECT. If UPDATE and SELECT policies forbid some rows that INSERT policies do not forbid, a user could store such rows.

Weakness

The product implements access controls via a policy or other feature with the intention to disable or restrict accesses (reads and/or writes) to assets in a system from untrusted agents. However, implemented access controls lack required granularity, which renders the control policy too broad because it allows accesses from unauthorized agents to the security-sensitive assets.

Affected Software

Name Vendor Start Version End Version
Postgresql Postgresql 15.0 (including) 15.4 (excluding)
Red Hat Enterprise Linux 8 RedHat postgresql:15-8090020231114113548.a75119d5 *
Red Hat Enterprise Linux 8.8 Extended Update Support RedHat postgresql:15-8080020231113134015.63b34585 *
Red Hat Enterprise Linux 9 RedHat postgresql:15-9030020231120082734.rhel9 *
Red Hat Enterprise Linux 9.2 Extended Update Support RedHat postgresql:15-9020020231115020618.rhel9 *
Postgresql-10 Ubuntu bionic *
Postgresql-12 Ubuntu trusty *
Postgresql-15 Ubuntu bionic *
Postgresql-15 Ubuntu lunar *
Postgresql-15 Ubuntu mantic *
Postgresql-15 Ubuntu trusty *
Postgresql-15 Ubuntu upstream *
Postgresql-15 Ubuntu xenial *
Postgresql-9.1 Ubuntu trusty *
Postgresql-9.3 Ubuntu trusty *
Postgresql-9.5 Ubuntu xenial *

Extended Description

Integrated circuits and hardware engines can expose accesses to assets (device configuration, keys, etc.) to trusted firmware or a software module (commonly set by BIOS/bootloader). This access is typically access-controlled. Upon a power reset, the hardware or system usually starts with default values in registers, and the trusted firmware (Boot firmware) configures the necessary access-control protection. A common weakness that can exist in such protection schemes is that access controls or policies are not granular enough. This condition allows agents beyond trusted agents to access assets and could lead to a loss of functionality or the ability to set up the device securely. This further results in security risks from leaked, sensitive, key material to modification of device configuration.

Potential Mitigations

References