Re: leaky views, yet again - Mailing list pgsql-hackers

From Stephen Frost
Subject Re: leaky views, yet again
Date
Msg-id 20101007131022.GQ26232@tamriel.snowman.net
Whole thread Raw
In response to Re: leaky views, yet again  (Robert Haas <robertmhaas@gmail.com>)
Responses Re: leaky views, yet again
Re: leaky views, yet again
List pgsql-hackers
* Robert Haas (robertmhaas@gmail.com) wrote:
> On Thu, Oct 7, 2010 at 2:02 AM, Heikki Linnakangas
> > Looks good. It gives the impression that you need to be able to a create
> > custom function to exploit, though. It would be good to mention that
> > internal functions can be used too, revoking access to CREATE FUNCTION does
> > not make you safe.
>
> OK, second try attached.

This might be overly pedantic, but I don't think 'tampering' gives the
right impression.  Also, there's a marked difference between viewing
data by using built-ins such as casting (since you'll only get to see
the first value in a column that fails the cast) and being able to write
a function that pulls out every row of the table and dumps it into
another table.  I think it'd have a much bigger impression if you went
ahead and changed the 'raise notice' to an 'insert into table x;'.

Also, even if you can't create functions (due to lack of create
privileges on any schema), you could use DO clauses now.  Revoking
usage rights on all languages should prevent both though.
Thanks,
    Stephen

pgsql-hackers by date:

Previous
From: Fujii Masao
Date:
Subject: Re: Sync Rep at Oct 5
Next
From: Andrew Dunstan
Date:
Subject: Re: Git cvsserver serious issue