STIGQter STIGQter: STIG Summary: Crunchy Data PostgreSQL Security Technical Implementation Guide Version: 1 Release: 1 Benchmark Date: 20 Nov 2020:

PostgreSQL and associated applications, when making use of dynamic code execution, must scan input data for invalid values that may indicate a code injection attack.

DISA Rule

SV-233528r617333_rule

Vulnerability Number

V-233528

Group Title

SRG-APP-000251-DB-000392

Rule Version

CD12-00-002000

Severity

CAT II

CCI(s)

Weight

10

Fix Recommendation

Where dynamic code execution is used, modify the code to implement protections against code injection (IE: prepared statements).

Check Contents

Review PostgreSQL source code (trigger procedures, functions) and application source code to identify cases of dynamic code execution.

If dynamic code execution is employed without protective measures against code injection, this is a finding.

Vulnerability Number

V-233528

Documentable

False

Rule Version

CD12-00-002000

Severity Override Guidance

Review PostgreSQL source code (trigger procedures, functions) and application source code to identify cases of dynamic code execution.

If dynamic code execution is employed without protective measures against code injection, this is a finding.

Check Content Reference

M

Target Key

5254

Comments