CVE-2024-43613: Azure Database for PostgreSQL Flexible Server Extension Elevation of Privilege Vulnerability

Overview

Severity
High (CVSS 7.2)
CVSS Vector
CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
Category
Elevation of Privilege
Exploit Status
Not Exploited
Exploitation Likelihood
Less Likely
Patch Tuesday
2024-Nov
Released
2024-11-12
EPSS Score
0.76% (percentile: 73.3%)

FAQ

What privileges could be gained by an attacker who successfully exploited the vulnerability? An attacker who successfully exploits this vulnerability would gain the same privileges as the SuperUser role. How could an attacker exploit this vulnerability? An attacker with the administrator role of "azure_pg_admin" in the target environment could exploit this vulnerability to gain the same privileges as a SuperUser by sending a specially crafted request to an Azure Database for PostgreSQL Flexible Server with specific non-default functionality enabled. According to the CVSS metric, privileges required is high (PR:H). What does that mean for this vulnerability? Successful exploitation of this vulnerability requires the attacker to have administrator privileges on the target system.

Affected Products (5)

Azure

  • Azure Database for PostgreSQL Flexible Server 16
  • Azure Database for PostgreSQL Flexible Server 15
  • Azure Database for PostgreSQL Flexible Server 14
  • Azure Database for PostgreSQL Flexible Server 13
  • Azure Database for PostgreSQL Flexible Server 12

Security Updates (1)

Acknowledgments

<a href="https://www.xing.com/profile/martin_wrona3">Martin Wrona (martin_jw)</a> with <a href="https://www.galaxus.ch/">Digitec Galaxus AG</a>

Revision History

  • 2024-11-12: Information published.