Vulnerability Details : CVE-2023-41114
An issue was discovered in EnterpriseDB Postgres Advanced Server (EPAS) before 11.21.32, 12.x before 12.16.20, 13.x before 13.12.16, 14.x before 14.9.0, and 15.x before 15.4.0. It contains the functions get_url_as_text and get_url_as_bytea that are publicly executable, thus permitting an authenticated user to read any file from the local filesystem or remote system regardless of that user's permissions.
Products affected by CVE-2023-41114
- cpe:2.3:a:enterprisedb:postgres_advanced_server:*:*:*:*:*:*:*:*
- cpe:2.3:a:enterprisedb:postgres_advanced_server:*:*:*:*:*:*:*:*
- cpe:2.3:a:enterprisedb:postgres_advanced_server:*:*:*:*:*:*:*:*
- cpe:2.3:a:enterprisedb:postgres_advanced_server:*:*:*:*:*:*:*:*
- cpe:2.3:a:enterprisedb:postgres_advanced_server:*:*:*:*:*:*:*:*
Exploit prediction scoring system (EPSS) score for CVE-2023-41114
0.06%
Probability of exploitation activity in the next 30 days
EPSS Score History
~ 30 %
Percentile, the proportion of vulnerabilities that are scored at or less
CVSS scores for CVE-2023-41114
Base Score | Base Severity | CVSS Vector | Exploitability Score | Impact Score | Score Source | First Seen |
---|---|---|---|---|---|---|
6.5
|
MEDIUM | CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N |
2.8
|
3.6
|
MITRE | |
6.5
|
MEDIUM | CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N |
2.8
|
3.6
|
NIST |
References for CVE-2023-41114
-
https://www.enterprisedb.com/docs/security/advisories/cve202341114/
EDB Docs - CVE-2023-41114 - EDB Postgres Advanced Server (EPAS) authenticated users may fetch any URLVendor Advisory
Jump to