CVE-2019-9193

Scores

EPSS

0.935high93.5%
0%20%40%60%80%100%

Percentile: 93.5%

CVSS

7.2high3.x
0246810

CVSS Score: 7.2/10

All CVSS Scores

CVSS 3.x
7.2

Vector: CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:N

CVSS 2.0
9.0

Vector: AV:N/AC:L/Au:S/C:C/I:C/A:C

Description

In PostgreSQL 9.3 through 11.2, the “COPY TO/FROM PROGRAM” function allows superusers and users in the ‘pg_execute_server_program’ group to execute arbitrary code in the context of the database’s operating system user. This functionality is enabled by default and can be abused to run arbitrary operating system commands on Windows, Linux, and macOS. NOTE: Third parties claim/state this is not an issue because PostgreSQL functionality for ‘COPY TO/FROM PROGRAM’ is acting as intended. References state that in PostgreSQL, a superuser can execute commands as the server user without using the ‘COPY FROM PROGRAM’.

Scaner-VS 7 — a modern vulnerability management solution

Uses this database for vulnerability detection. High-speed search, cross-platform, advanced configuration audit, and flexible filtering. Suitable for organizations of any size.
Learn more about Scaner-VS 7

Sources

nvdubuntu

CWEs

CWE-20CWE-78

Exploits

Exploit ID: 46813

Source: exploitdb

URL: https://www.exploit-db.com/exploits/46813

Exploit ID: CVE-2019-9193

Source: github-poc

URL: https://github.com/CybersRMUTL/CVE-2019-9193-Postgresql-RCE

Vulnerable Software (6)

Type: Configuration

Product: postgresql-10

Operating System: ubuntu bionic 18.04

Trait:
{  "unaffected": true}

Source: ubuntu

Type: Configuration

Product: postgresql-10

Operating System: ubuntu cosmic 18.10

Trait:
{  "unaffected": true}

Source: ubuntu

Type: Configuration

Product: postgresql-9.1

Operating System: ubuntu trusty 14.04

Trait:
{  "unaffected": true}

Source: ubuntu

Type: Configuration

Product: postgresql-9.3

Operating System: ubuntu trusty 14.04

Trait:
{  "unaffected": true}

Source: ubuntu

Type: Configuration

Product: postgresql-9.5

Operating System: ubuntu xenial 16.04

Trait:
{  "unaffected": true}

Source: ubuntu

Type: Configuration

Vendor: *

Product: postgresql

Operating System: * * *

Trait:
{  "cpe_match": [    {      "cpe23uri": "cpe:2.3:a:postgresql:postgresql:*:*:*:*:*:*:*:*",      "versionEndIncluding": "11.2",      "versionStartIncluding": "9.3",      "vulnerable": true    }...

Source: nvd

End of list