Re: Security hole in PL/pgSQL - Mailing list pgsql-hackers

From KuroiNeko
Subject Re: Security hole in PL/pgSQL
Date
Msg-id 3A7593BE.nail1NF1IN0JY@ed.ed
Whole thread Raw
In response to Security hole in PL/pgSQL  (Jan Wieck <janwieck@Yahoo.com>)
List pgsql-hackers
> the new EXECUTE command in PL/pgSQL is a security hole.
This actually  depends but I must  admit that I'm concerned  too. However,
the responsibility  for the results  should be split adequately  IMHO. DBAs
should  take care  about unathorized  access  to PGSQL  server, that's  why
pg_hba.conf  is there.  Programmers allowed  in  must make  sure that  only
relative paths or trusted directories are accessed (stripping out `../' and
prepending a  pre-defined path is  a must) Also, implementation  of EXECUTE
should probably rely upon execle() with environment dropped to known secure
minimum.Sorry if this all is already taken into consideration. Just want to second
Jan's statement.


--
������������������



pgsql-hackers by date:

Previous
From: Tom Lane
Date:
Subject: Re: Shouldn't this be an error?
Next
From: "Ross J. Reedstrom"
Date:
Subject: Re: Sure enough, the lock file is gone