UCF STIG Viewer Logo

VMware Postgres must not allow schema access to unauthorized accounts.


Overview

Finding ID Version Rule ID IA Controls Severity
V-239209 VCPG-67-000017 SV-239209r717061_rule Medium
Description
Database management systems typically separate security functionality from non-security functionality via separate databases or schemas. Database objects or code implementing security functionality should not be commingled with objects or code implementing application logic. When security and non-security functionality are commingled, users who have access to non-security functionality may be able to access security functionality. VMware Postgres contains a number of system configuration schema whose access must be strictly limited. By default, the pg_catalog and information_schema objects are configured to only be accessible in a read-only manner publicly, and otherwise only accessible by the Postgres user. This configuration must be verified and maintained.
STIG Date
VMware vSphere 6.7 PostgreSQL Security Technical Implementation Guide 2021-04-15

Details

Check Text ( C-42442r678998_chk )
At the command prompt, execute the following command:

# /opt/vmware/vpostgres/current/bin/psql -U postgres -c "\dp .*.;"/opt/vmware/vpostgres/current/bin/psql -U postgres -c "\dp .*.;"|grep -E "information_schema|pg_catalog"|awk -F '|' '{print $4}'|awk -F '/' '{print $1}'|grep -v "=r"|grep -v "postgres"|grep -v " "

If any lines are returned, this is a finding.
Fix Text (F-42401r678999_fix)
At the command prompt, execute the following command:

# /opt/vmware/vpostgres/current/bin/psql -U postgres -c "REVOKE ALL PRIVILEGES ON FROM ;"

Replace and with the Access Privilege name and account, respectively, discovered during the check.