Privilege escalation via LOAD - Mailing list pgsql-bugs

From John Heasman
Subject Privilege escalation via LOAD
Date
Msg-id Pine.WNT.4.61.0501211049190.1264@j2
Whole thread Raw
Responses Re: Privilege escalation via LOAD  (Tom Lane <tgl@sss.pgh.pa.us>)
List pgsql-bugs
Hi guys,

It appears that low privileged users can invoke the LOAD extension to load
arbitrary libraries into the postgres process space.  On Windows systems
this is achieved by calling LoadLibrary
(src/backend/port/dynloader/win32.c).  The effect of this is that DllMain
will be executed.  Since LOAD takes an absolute path, UNC paths may be
used on Windows, thus a low privileged database user can load an arbitrary
library from an anonymous share they have set up, escalating to the
privileges of the database user. I am still investigating the impact on
Unix.

Cheers

John

(this vulnerability was born out of a discussion on #postgresql
between myself, lurka and dennisb).

pgsql-bugs by date:

Previous
From: "Hendrik Mueller"
Date:
Subject: BUG #1428: SHGetSpecialFolderPath not found in SHELL32.dll
Next
From: "Sam Hahn"
Date:
Subject: BUG #1432: type "cube" does not exist