CVE-2019-9193
HIGH EXPLOITED IN THE WILD NUCLEIPostgresql < 11.2 - OS Command Injection
Title source: ruleDescription
In PostgreSQL 9.3 through 11.2, the "COPY TO/FROM PROGRAM" function allows superusers and users in the 'pg_execute_server_program' group to execute arbitrary code in the context of the database's operating system user. This functionality is enabled by default and can be abused to run arbitrary operating system commands on Windows, Linux, and macOS. NOTE: Third parties claim/state this is not an issue because PostgreSQL functionality for ‘COPY TO/FROM PROGRAM’ is acting as intended. References state that in PostgreSQL, a superuser can execute commands as the server user without using the ‘COPY FROM PROGRAM’.
Exploits (16)
exploitdb
WORKING POC
VERIFIED
by Metasploit · rubyremotemultiple
https://www.exploit-db.com/exploits/46813
exploitdb
WORKING POC
by Paulo Trindade · pythonremotemultiple
https://www.exploit-db.com/exploits/51247
nomisec
WORKING POC
1 stars
by paulotrindadec · remote-auth
https://github.com/paulotrindadec/CVE-2019-9193
nomisec
WORKING POC
by CybersRMUTL · remote-auth
https://github.com/CybersRMUTL/CVE-2019-9193-Postgresql-RCE
nomisec
WORKING POC
by corsisechero · remote-auth
https://github.com/corsisechero/CVE-2019-9193byVulHub
nomisec
WORKING POC
by chromanite · remote-auth
https://github.com/chromanite/CVE-2019-9193-PostgreSQL-9.3-11.7
metasploit
WORKING POC
EXCELLENT
by Jacob Wilkin · rubypocunix
https://github.com/rapid7/metasploit-framework/blob/master/modules/exploits/multi/postgres/postgres_copy_from_program_cmd_exec.rb
Nuclei Templates (1)
PostgreSQL 9.3-12.3 Authenticated Remote Code Execution
HIGHVERIFIEDby pussycat0x
Shodan:
product:"PostgreSQL"
References (8)
Scores
CVSS v3
7.2
EPSS
0.9340
EPSS Percentile
99.8%
Attack Vector
NETWORK
CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H
Details
VulnCheck KEV
2021-01-22
InTheWild.io
2020-04-07
CWE
CWE-78
Status
published
Products (1)
postgresql/postgresql
9.3 - 11.2
Published
Apr 01, 2019
Tracked Since
Feb 18, 2026