mirror of
https://github.com/postgres/postgres.git
synced 2025-06-14 18:42:34 +03:00
Make REPLICATION privilege checks test current user not authenticated user.
The pg_start_backup() and pg_stop_backup() functions checked the privileges of the initially-authenticated user rather than the current user, which is wrong. For example, a user-defined index function could successfully call these functions when executed by ANALYZE within autovacuum. This could allow an attacker with valid but low-privilege database access to interfere with creation of routine backups. Reported and fixed by Noah Misch. Security: CVE-2013-1901
This commit is contained in:
@ -390,15 +390,15 @@ SetUserIdAndContext(Oid userid, bool sec_def_context)
|
||||
|
||||
|
||||
/*
|
||||
* Check if the authenticated user is a replication role
|
||||
* Check whether specified role has explicit REPLICATION privilege
|
||||
*/
|
||||
bool
|
||||
is_authenticated_user_replication_role(void)
|
||||
has_rolreplication(Oid roleid)
|
||||
{
|
||||
bool result = false;
|
||||
HeapTuple utup;
|
||||
|
||||
utup = SearchSysCache1(AUTHOID, ObjectIdGetDatum(AuthenticatedUserId));
|
||||
utup = SearchSysCache1(AUTHOID, ObjectIdGetDatum(roleid));
|
||||
if (HeapTupleIsValid(utup))
|
||||
{
|
||||
result = ((Form_pg_authid) GETSTRUCT(utup))->rolreplication;
|
||||
|
Reference in New Issue
Block a user