Vulnerability Details : CVE-2023-41118
An issue was discovered in EnterpriseDB Postgres Advanced Server (EPAS) before 11.21.32, 12.x before 12.16.20, 13.x before 13.12.16, 14.x before 14.9.0, and 15.x before 15.4.0. It may allow an authenticated user to bypass authorization requirements and access underlying implementation functions. When a superuser has configured file locations using CREATE DIRECTORY, these functions allow users to take a wide range of actions, including read, write, copy, rename, and delete.
Products affected by CVE-2023-41118
- cpe:2.3:a:enterprisedb:postgres_advanced_server:*:*:*:*:*:*:*:*
- cpe:2.3:a:enterprisedb:postgres_advanced_server:*:*:*:*:*:*:*:*
- cpe:2.3:a:enterprisedb:postgres_advanced_server:*:*:*:*:*:*:*:*
- cpe:2.3:a:enterprisedb:postgres_advanced_server:*:*:*:*:*:*:*:*
- cpe:2.3:a:enterprisedb:postgres_advanced_server:*:*:*:*:*:*:*:*
Exploit prediction scoring system (EPSS) score for CVE-2023-41118
0.09%
Probability of exploitation activity in the next 30 days
EPSS Score History
~ 39 %
Percentile, the proportion of vulnerabilities that are scored at or less
CVSS scores for CVE-2023-41118
Base Score | Base Severity | CVSS Vector | Exploitability Score | Impact Score | Score Source | First Seen |
---|---|---|---|---|---|---|
8.8
|
HIGH | CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H |
2.8
|
5.9
|
NIST |
References for CVE-2023-41118
-
https://www.enterprisedb.com/docs/security/advisories/cve202341118/
EDB Docs - CVE-2023-41118 - EDB Postgres Advanced Server (EPAS) UTL_FILE permission bypassVendor Advisory
Jump to