Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2024-10979: External Control of System or Configuration Setting in PostgreSQL

0
High
VulnerabilityCVE-2024-10979cvecve-2024-10979
Published: Thu Nov 14 2024 (11/14/2024, 13:00:08 UTC)
Source: CVE Database V5
Product: PostgreSQL

Description

Incorrect control of environment variables in PostgreSQL PL/Perl allows an unprivileged database user to change sensitive process environment variables (e.g. PATH). That often suffices to enable arbitrary code execution, even if the attacker lacks a database server operating system user. Versions before PostgreSQL 17.1, 16.5, 15.9, 14.14, 13.17, and 12.21 are affected.

AI-Powered Analysis

AILast updated: 11/03/2025, 23:16:06 UTC

Technical Analysis

CVE-2024-10979 is a vulnerability in PostgreSQL's PL/Perl procedural language implementation that allows unprivileged database users to externally control system or configuration settings by modifying environment variables. Specifically, the flaw lies in insufficient restrictions on environment variables like PATH, which are critical for process execution contexts. By altering these variables, an attacker can influence the execution of system commands or binaries, effectively enabling arbitrary code execution on the database server. This is particularly dangerous because the attacker does not require operating system-level user privileges or any user interaction to exploit the vulnerability. Affected PostgreSQL versions include all releases before 17.1, 16.5, 15.9, 14.14, 13.17, and 12.21, covering a broad range of currently supported versions. The vulnerability has a CVSS v3.1 score of 8.8, reflecting high impact on confidentiality, integrity, and availability, with low attack complexity and requiring only low privileges. Although no public exploits have been reported yet, the nature of the vulnerability suggests that exploitation could lead to full compromise of the database server environment. This vulnerability is critical because PostgreSQL is widely used in enterprise and government environments, and PL/Perl is a common procedural language extension. The flaw underscores the importance of strict environment variable controls in multi-tenant or shared database environments.

Potential Impact

For European organizations, the impact of CVE-2024-10979 can be severe. Successful exploitation could lead to unauthorized code execution on database servers, potentially allowing attackers to exfiltrate sensitive data, alter or delete critical information, or disrupt database availability. This is particularly concerning for sectors such as finance, healthcare, government, and critical infrastructure that rely heavily on PostgreSQL for data storage and processing. The ability to execute arbitrary code without OS-level privileges increases the risk of lateral movement within networks and persistent compromise. Additionally, the vulnerability could undermine trust in data integrity and confidentiality, leading to regulatory and compliance issues under frameworks like GDPR. The widespread use of PostgreSQL across European enterprises means that many organizations could be exposed if they have not updated to patched versions or implemented compensating controls. The lack of known exploits in the wild currently provides a window for proactive mitigation, but the high severity score indicates that attackers may develop exploits rapidly.

Mitigation Recommendations

1. Immediately upgrade PostgreSQL installations to the fixed versions: 17.1, 16.5, 15.9, 14.14, 13.17, or 12.21 as applicable. 2. If upgrading is not immediately possible, disable or restrict the use of PL/Perl procedural language to trusted database roles only, minimizing exposure. 3. Implement strict access controls and auditing on database users who have permission to execute PL/Perl functions. 4. Monitor environment variables and process execution contexts on database servers for unauthorized changes, using host-based intrusion detection systems. 5. Employ network segmentation and least privilege principles to limit the impact of potential exploitation. 6. Review and harden operating system and database server configurations to reduce the attack surface, including disabling unnecessary procedural languages if not in use. 7. Stay informed on PostgreSQL security advisories and apply patches promptly. 8. Conduct regular security assessments and penetration testing focusing on procedural language extensions and environment variable handling.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.2
Assigner Short Name
PostgreSQL
Date Reserved
2024-11-07T19:27:04.476Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 69092615fe7723195e0b3597

Added to database: 11/3/2025, 10:00:53 PM

Last enriched: 11/3/2025, 11:16:06 PM

Last updated: 11/5/2025, 2:06:19 PM

Views: 1

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats