Friday, April 25, 2025
HomeCVE/vulnerabilityPostgreSQL Vulnerability Allows Hackers To Execute Arbitrary SQL Functions

PostgreSQL Vulnerability Allows Hackers To Execute Arbitrary SQL Functions

Published on

SIEM as a Service

Follow Us on Google News

A critical vulnerability identified as CVE-2024-7348 has been discovered in PostgreSQL, enabling attackers to execute arbitrary SQL functions.

This vulnerability in the pg_dump utility poses a significant security risk, especially when executed by superusers.

CVE-2024-7348 – Vulnerability Details

The flaw is a Time-of-check Time-of-use (TOCTOU) race condition in the pg_dump process. An attacker can exploit this by replacing another relation type with a view or foreign table, allowing them to execute arbitrary SQL functions.

- Advertisement - Google News

Are you from SOC and DFIR Teams? Analyse Malware Incidents & get live Access with ANY.RUN -> Get 14 Days Free Access

The attack requires precise timing to coincide with the start of pg_dump, but the race condition is easily won if the attacker maintains an open transaction.

Affected Versions

The vulnerability affects PostgreSQL versions before 16.4, 15.8, 14.13, 13.16, and 12.20. The PostgreSQL project has released patches for these versions as of August 8, 2024. Users are strongly advised to update their systems to these fixed versions to mitigate the risk.

Version Information

Affected VersionFixed InFix Published
1616.4Aug. 8, 2024
1515.8Aug. 8, 2024
1414.13Aug. 8, 2024
1313.16Aug. 8, 2024
1212.20Aug. 8, 2024

Security Assessment

The vulnerability has been assigned a CVSS 3.0 overall score of 8.8, indicating a high severity level.

The core server component is affected, with the vector described as AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H, highlighting the potential for significant confidentiality, integrity, and availability impacts.

The PostgreSQL project acknowledges Noah Misch for reporting this issue. Users who discover new security vulnerabilities are encouraged to contact the PostgreSQL security team. For non-security-related bugs, users should refer to the Report a Bug page.

This vulnerability underscores the importance of timely updates and vigilant security practices to protect sensitive data and maintain system integrity.

Download Free Cybersecurity Planning Checklist for SME Leaders (PDF) – Free Download

Divya
Divya
Divya is a Senior Journalist at GBhackers covering Cyber Attacks, Threats, Breaches, Vulnerabilities and other happenings in the cyber world.

Latest articles

7 Best Third-Party Risk Management Software in 2025

Whether you operate a small business or run a large enterprise, you rely on...

Chrome UAF Process Vulnerabilities Actively Exploited

Security researchers have revealed that two critical use-after-free (UAF) vulnerabilities in Google Chrome’s Browser...

Microsoft Defender XDR False Positive Leaked Massive 1,700+ Sensitive Documents to Publish

An alarming data leak involving Microsoft Defender XDR has exposed more than 1,700 sensitive...

‘SessionShark’ – A New Toolkit Bypasses Microsoft Office 365 MFA Security

Security researchers have uncovered a new and sophisticated threat to Microsoft Office 365 users:...

Resilience at Scale

Why Application Security is Non-Negotiable

The resilience of your digital infrastructure directly impacts your ability to scale. And yet, application security remains a critical weak link for most organizations.

Application Security is no longer just a defensive play—it’s the cornerstone of cyber resilience and sustainable growth. In this webinar, Karthik Krishnamoorthy (CTO of Indusface) and Phani Deepak Akella (VP of Marketing – Indusface), will share how AI-powered application security can help organizations build resilience by

Discussion points


Protecting at internet scale using AI and behavioral-based DDoS & bot mitigation.
Autonomously discovering external assets and remediating vulnerabilities within 72 hours, enabling secure, confident scaling.
Ensuring 100% application availability through platforms architected for failure resilience.
Eliminating silos with real-time correlation between attack surface and active threats for rapid, accurate mitigation

More like this

7 Best Third-Party Risk Management Software in 2025

Whether you operate a small business or run a large enterprise, you rely on...

Chrome UAF Process Vulnerabilities Actively Exploited

Security researchers have revealed that two critical use-after-free (UAF) vulnerabilities in Google Chrome’s Browser...

Microsoft Defender XDR False Positive Leaked Massive 1,700+ Sensitive Documents to Publish

An alarming data leak involving Microsoft Defender XDR has exposed more than 1,700 sensitive...