STIGQter STIGQter: STIG Summary: PostgreSQL 9.x Security Technical Implementation Guide Version: 2 Release: 1 Benchmark Date: 23 Oct 2020:

PostgreSQL and associated applications, when making use of dynamic code execution, must scan input data for invalid values that may indicate a code injection attack.

DISA Rule

SV-214065r508027_rule

Vulnerability Number

V-214065

Group Title

SRG-APP-000251-DB-000392

Rule Version

PGS9-00-002000

Severity

CAT II

CCI(s)

Weight

10

Fix Recommendation

Where dynamic code execution is used, modify the code to implement protections against code injection (IE: prepared statements).

Check Contents

Review PostgreSQL source code (trigger procedures, functions) and application source code to identify cases of dynamic code execution.

If dynamic code execution is employed without protective measures against code injection, this is a finding.

Vulnerability Number

V-214065

Documentable

False

Rule Version

PGS9-00-002000

Severity Override Guidance

Review PostgreSQL source code (trigger procedures, functions) and application source code to identify cases of dynamic code execution.

If dynamic code execution is employed without protective measures against code injection, this is a finding.

Check Content Reference

M

Target Key

3994

Comments