Unprivileged User Can Execute Arbitrary Code via Environment Variables
CVE-2024-10979
Key Information:
- Vendor
- PostgreSQL
- Status
- Vendor
- CVE Published:
- 14 November 2024
Badges
Summary
The PostgreSQL open-source database system has a high-severity security flaw (CVE-2024-10979) that allows unprivileged users to alter environment variables, potentially leading to code execution or information disclosure. This vulnerability could enable an attacker to execute arbitrary code by modifying environment variables such as PATH, or extract valuable information by running malicious queries. Exploitation has not been reported, and the issue has been addressed in PostgreSQL versions 17.1, 16.5, 15.9, 14.14, 13.17, and 12.21. Users are advised to update their systems to prevent potential code execution and data breaches.
Affected Version(s)
PostgreSQL 17 < 17.1
PostgreSQL 16 < 16.5
PostgreSQL 15 < 15.9
Get notified when SecurityVulnerability.io launches alerting ๐
Well keep you posted ๐ง
News Articles

8.8 Rated PostgreSQL Vulnerability Puts Databases at Risk
Cybersecurity researchers have identified a serious security flaw in PostgreSQL that could lead to data breaches and system compromise.

High-Severity Flaw in PostgreSQL Allows Hackers to Exploit Environment Variables
Critical PostgreSQL flaw (CVE-2024-10979) patched; update now to prevent code execution and data breaches.
References
CVSS V3.1
Timeline
- ๐พ
Exploit known to exist
- ๐ฐ
First article discovered by The Hacker News
Vulnerability published