CVE-2023-25149 involves an access control flaw in TimescaleDB, allowing privilege escalation. Learn about the impact, mitigation steps, and affected versions.
This CVE involves TimescaleDB, an open-source time-series SQL database, which has been found to have an incorrect access control issue that could lead to privilege escalation.
Understanding CVE-2023-25149
This vulnerability in TimescaleDB affects versions 2.8.0 through 2.9.2, involving improper access control that allows for privilege escalation.
What is CVE-2023-25149?
TimescaleDB has a privilege escalation vulnerability in versions 2.8.0 through 2.9.2. During installation, TimescaleDB creates a telemetry job that runs as the installation user. The queries run as part of the telemetry data collection were not run with a locked-down
search_path
, enabling malicious users to create functions executed by the telemetry job, leading to privilege escalation. Exploiting this vulnerability requires the ability to create objects in a database and then have a superuser install TimescaleDB into the database. When TimescaleDB is installed as a trusted extension, non-superusers can install the extension without superuser assistance. Version 2.9.3 addresses this issue.
The Impact of CVE-2023-25149
The impact of this vulnerability is rated as high, with a CVSS base score of 8.8. It poses a risk to confidentiality, integrity, and availability, with a low level of privileges required for exploitation.
Technical Details of CVE-2023-25149
This section delves into the specific technical aspects of the vulnerability.
Vulnerability Description
The vulnerability arises from improper access control in TimescaleDB versions 2.8.0 through 2.9.2, allowing for privilege escalation through the telemetry job.
Affected Systems and Versions
TimescaleDB versions affected by this vulnerability are >= 2.8.0 and < 2.9.3.
Exploitation Mechanism
Malicious users can exploit the vulnerability by creating functions executed by the telemetry job, which runs without a locked-down
search_path
, enabling privilege escalation.
Mitigation and Prevention
It is crucial to take immediate steps to address and prevent exploitation of this vulnerability.
Immediate Steps to Take
To mitigate this vulnerability, ensure that the
search_path
of the user running the telemetry job is restricted to exclude schemas writable by other users. Additionally, updating to version 2.9.3 resolves this issue.
Long-Term Security Practices
Implement strict access controls, regularly update software to the latest versions, and conduct security assessments to identify and address vulnerabilities proactively.
Patching and Updates
Ensure timely application of security patches and updates provided by TimescaleDB to address known vulnerabilities and strengthen the security posture of the database system.