Reject substituting extension schemas or owners matching ["$'\].
Substituting such values in extension scripts facilitated SQL injection
when @extowner@, @extschema@, or @extschema:...@ appeared inside a
quoting construct (dollar quoting, '', or ""). No bundled extension was
vulnerable. Vulnerable uses do appear in a documentation example and in
non-bundled extensions. Hence, the attack prerequisite was an
administrator having installed files of a vulnerable, trusted,
non-bundled extension. Subject to that prerequisite, this enabled an
attacker having database-level CREATE privilege to execute arbitrary
code as the bootstrap superuser. By blocking this attack in the core
server, there's no need to modify individual extensions. Back-patch to
v11 (all supported versions).
Reported by Micah Gate, Valerie Woolard, Tim Carey-Smith, and Christoph
Berg.
Security: CVE-2023-39417
Branch
------
master
Details
-------
https://git.postgresql.org/pg/commitdiff/cd5f2a357014d5ed8205191f8e1fb180f1439599
Modified Files
--------------
src/backend/commands/extension.c | 27 +++++++++++++++++
src/test/modules/test_extensions/Makefile | 2 ++
.../test_extensions/expected/test_extensions.out | 35 +++++++++++++++-------
src/test/modules/test_extensions/meson.build | 2 ++
.../test_extensions/sql/test_extensions.sql | 20 ++++++++++---
.../test_extensions/test_ext_extschema--1.0.sql | 5 ++++
.../test_extensions/test_ext_extschema.control | 3 ++
7 files changed, 79 insertions(+), 15 deletions(-)