zCat on Nostr: High-Severity Flaw in PostgreSQL Allows Hackers to Exploit Environment Variables ...
High-Severity Flaw in PostgreSQL Allows Hackers to Exploit Environment Variables
Cybersecurity researchers have disclosed a high-severity security flaw in the PostgreSQL open-source database system that could allow unprivileged users to alter environment variables, and potentially lead to code execution or information disclosure.
The vulnerability, tracked as CVE-2024-10979, carries a CVSS score of 8.8.
Environment variables are user-defined values that can allow a program to dynamically fetch various kinds of information, such as access keys and software installation paths, during runtime without having to hard-code them. In certain operating systems, they are initialized during the startup phase.
See more
The Hackers News:
https://thehackernews.com/2024/11/high-severity-flaw-in-postgresql-allows.htmlHackread:
https://hackread.com/postgresql-vulnerability-puts-databases-at-risk/#cybersecurity #postgres
Published at
2024-11-16 02:11:04Event JSON
{
"id": "176fd8e039d52666d8e691188982a16d5102f4b454f11e928d41a3cc77dd1fd0",
"pubkey": "16fd26f00054f66151c6bd7925edef41586103af19d445f93f66f5e24b34427a",
"created_at": 1731723064,
"kind": 1,
"tags": [
[
"t",
"cybersecurity"
],
[
"t",
"postgres"
],
[
"r",
"https://thehackernews.com/2024/11/high-severity-flaw-in-postgresql-allows.html"
],
[
"r",
"https://hackread.com/postgresql-vulnerability-puts-databases-at-risk/"
]
],
"content": "High-Severity Flaw in PostgreSQL Allows Hackers to Exploit Environment Variables\n\nCybersecurity researchers have disclosed a high-severity security flaw in the PostgreSQL open-source database system that could allow unprivileged users to alter environment variables, and potentially lead to code execution or information disclosure.\n\nThe vulnerability, tracked as CVE-2024-10979, carries a CVSS score of 8.8.\n\nEnvironment variables are user-defined values that can allow a program to dynamically fetch various kinds of information, such as access keys and software installation paths, during runtime without having to hard-code them. In certain operating systems, they are initialized during the startup phase.\n\nSee more\nThe Hackers News: https://thehackernews.com/2024/11/high-severity-flaw-in-postgresql-allows.html\n\nHackread:\nhttps://hackread.com/postgresql-vulnerability-puts-databases-at-risk/\n\n#cybersecurity #postgres",
"sig": "5eeba2b709d37507229e95c1f065da12dea6c4dd119a7d2cc34b7137aafee1ba5432f5adfbc788e049a8ef25652f94037d54d1a8ff139859d4a9718dd481593b"
}