Re: BUG #13651: trigger security invoker attack

From: "David G(dot) Johnston" <david(dot)g(dot)johnston(at)gmail(dot)com>
To: 德哥 <digoal(at)126(dot)com>
Cc: "pgsql-bugs(at)postgresql(dot)org" <pgsql-bugs(at)postgresql(dot)org>
Subject: Re: BUG #13651: trigger security invoker attack
Date: 2015-09-30 03:26:42
Message-ID: CAKFQuwbRFFSMy_0xxGe75MR4XBrCm+rbogug6hrVx044obkMEA@mail.gmail.com
Views: Raw Message | Whole Thread | Download mbox | Resend email
Thread:
Lists: pgsql-bugs

On Tuesday, September 29, 2015, 德哥 <digoal(at)126(dot)com> wrote:

> I hope this :
> Nonsuperuser cann't CREATE | ALTER security invoker Functions.
>

In that case don't hold your breath. Besides, your rules-based spoofing
doesn't actually have this problem since the rule owner is the invoker, not
the original user. And I'm still confused regarding your original post and
how it describes an active risk. Your second example is also flawed as
it requires superuser permissions to work.

Security invoker are safe because the caller cannot do anything they
couldn't otherwise do. That doesn't mean they should treat the code as
trusted or a black-box.

Do you have a suggestion that doesn't amount to scraping the whole thing
and staring over?

David J.

In response to

Responses

Browse pgsql-bugs by date

  From Date Subject
Next Message 德哥 2015-09-30 05:19:46 Re: BUG #13651: trigger security invoker attack
Previous Message 德哥 2015-09-30 02:41:00 Re: BUG #13651: trigger security invoker attack