From: | "David G(dot) Johnston" <david(dot)g(dot)johnston(at)gmail(dot)com> |
---|---|
To: | 德哥 <digoal(at)126(dot)com> |
Cc: | "pgsql-bugs(at)postgresql(dot)org" <pgsql-bugs(at)postgresql(dot)org> |
Subject: | Re: BUG #13651: trigger security invoker attack |
Date: | 2015-09-30 03:26:42 |
Message-ID: | CAKFQuwbRFFSMy_0xxGe75MR4XBrCm+rbogug6hrVx044obkMEA@mail.gmail.com |
Views: | Raw Message | Whole Thread | Download mbox | Resend email |
Thread: | |
Lists: | pgsql-bugs |
On Tuesday, September 29, 2015, 德哥 <digoal(at)126(dot)com> wrote:
> I hope this :
> Nonsuperuser cann't CREATE | ALTER security invoker Functions.
>
In that case don't hold your breath. Besides, your rules-based spoofing
doesn't actually have this problem since the rule owner is the invoker, not
the original user. And I'm still confused regarding your original post and
how it describes an active risk. Your second example is also flawed as
it requires superuser permissions to work.
Security invoker are safe because the caller cannot do anything they
couldn't otherwise do. That doesn't mean they should treat the code as
trusted or a black-box.
Do you have a suggestion that doesn't amount to scraping the whole thing
and staring over?
David J.
From | Date | Subject | |
---|---|---|---|
Next Message | 德哥 | 2015-09-30 05:19:46 | Re: BUG #13651: trigger security invoker attack |
Previous Message | 德哥 | 2015-09-30 02:41:00 | Re: BUG #13651: trigger security invoker attack |