IN THE EXTENSION SCRIPT, a SQL Injection vulnerability was found in PostgreSQL if it uses @extowner@, @extschema@, or @extschema:...@ inside a quoting construct (dollar quoting, '', or ""). If an administrator has installed files of a vulnerable, trusted, non-
IN THE EXTENSION SCRIPT, a SQL Injection vulnerability was found in PostgreSQL if it uses @extowner@, @extschema@, or @extschema:...@ inside a quoting construct (dollar quoting, '', or ""). If an administrator has installed files of a vulnerable, trusted, non-bundled extension, an attacker with database-level CREATE privilege can execute arbitrary code as the bootstrap superuser.
| Vendor | Product | Versions |
|---|---|---|
| Red Hat | Red Hat Advanced Cluster Security 4.2 | 4.2.4-6 |
| Red Hat | Red Hat Advanced Cluster Security 4.2 | 4.2.4-6 |
| Red Hat | Red Hat Advanced Cluster Security 4.2 | 4.2.4-7 |
| Red Hat | Red Hat Advanced Cluster Security 4.2 | 4.2.4-6 |
| Red Hat | Red Hat Advanced Cluster Security 4.2 | 4.2.4-7 |
| Red Hat | Red Hat Enterprise Linux 8 | 8090020231114113712.a75119d5 |
| Red Hat | Red Hat Enterprise Linux 8 | 8090020231128173330.a75119d5 |
| Red Hat | Red Hat Enterprise Linux 8 | 8090020231114113548.a75119d5 |
| Red Hat | Red Hat Enterprise Linux 8.2 Advanced Update Support | 8020020231128165246.4cda2c84 |
| Red Hat | Red Hat Enterprise Linux 8.2 Telecommunications Update Service | 8020020231128165246.4cda2c84 |
| Red Hat | Red Hat Enterprise Linux 8.2 Update Services for SAP Solutions | 8020020231128165246.4cda2c84 |
| Red Hat | Red Hat Enterprise Linux 8.4 Advanced Mission Critical Update Support | 8040020231127153301.522a0ee4 |
| Red Hat | Red Hat Enterprise Linux 8.4 Advanced Mission Critical Update Support | 8040020231127154806.522a0ee4 |
| Red Hat | Red Hat Enterprise Linux 8.4 Telecommunications Update Service | 8040020231127153301.522a0ee4 |
| Red Hat | Red Hat Enterprise Linux 8.4 Telecommunications Update Service | 8040020231127154806.522a0ee4 |
| Red Hat | Red Hat Enterprise Linux 8.4 Update Services for SAP Solutions | 8040020231127153301.522a0ee4 |
| Red Hat | Red Hat Enterprise Linux 8.4 Update Services for SAP Solutions | 8040020231127154806.522a0ee4 |
| Red Hat | Red Hat Enterprise Linux 8.6 Extended Update Support | 8060020231114115246.ad008a3a |
| Red Hat | Red Hat Enterprise Linux 8.6 Extended Update Support | 8060020231128165328.ad008a3a |
| Red Hat | Red Hat Enterprise Linux 8.8 Extended Update Support | 8080020231114105206.63b34585 |
| Red Hat | Red Hat Enterprise Linux 8.8 Extended Update Support | 8080020231128165335.63b34585 |
| Red Hat | Red Hat Enterprise Linux 8.8 Extended Update Support | 8080020231113134015.63b34585 |
| Red Hat | Red Hat Enterprise Linux 9 | 0:13.13-1.el9_3 |
| Red Hat | Red Hat Enterprise Linux 9 | 9030020231120082734.rhel9 |
| Red Hat | Red Hat Enterprise Linux 9.0 Extended Update Support | 0:13.13-1.el9_0 |
| Red Hat | Red Hat Enterprise Linux 9.2 Extended Update Support | 0:13.13-1.el9_2 |
| Red Hat | Red Hat Enterprise Linux 9.2 Extended Update Support | 9020020231115020618.rhel9 |
| Red Hat | Red Hat Software Collections for Red Hat Enterprise Linux 7 | 0:12.17-1.el7 |
| Red Hat | Red Hat Software Collections for Red Hat Enterprise Linux 7 | 0:13.13-1.el7 |
| Red Hat | RHACS | 3.74-RHEL-8 — 3.74.8-9 |
| Red Hat | RHACS | 3.74-RHEL-8 — 3.74.8-9 |
| Red Hat | RHACS | 3.74-RHEL-8 — 3.74.8-7 |
| Red Hat | RHACS | 3.74-RHEL-8 — 3.74.8-9 |
| Red Hat | RHACS | 3.74-RHEL-8 — 3.74.8-9 |
| Red Hat | RHACS | 4.1-RHEL-8 — 4.1.6-6 |
| Red Hat | RHACS | 4.1-RHEL-8 — 4.1.6-6 |
| Red Hat | RHACS | 4.1-RHEL-8 — 4.1.6-6 |
| Red Hat | RHACS | 4.1-RHEL-8 — 4.1.6-6 |
| Red Hat | RHACS | 4.1-RHEL-8 — 4.1.6-6 |
| Red Hat | Red Hat Enterprise Linux 6 | unspecified |
| Red Hat | Red Hat Enterprise Linux 7 | unspecified |
| Red Hat | Red Hat Enterprise Linux 8 | unspecified |
| Red Hat | Red Hat Software Collections | unspecified |
Not currently listed on the CISA Known Exploited Vulnerabilities (KEV) catalog. EPSS is the best forward-looking signal — see the EPSS row above.
For the full vendor write-up, exploit chains, and reference implementations, see the references list in section 09.
Open the Sigma generator with a pre-filled prompt for this CVE to draft a starting detection in your stack of choice:
No directly-cited follow-up CVEs in the KB record for this advisory. The references list in section 09 carries the vendor cross-references.