Downloading and using a database from an untrusted source?

If I were to get the database (in this case for postgresql) from an untrusted source, is there a risk of activating it and querying it?

+5
source share
2 answers

There are many possible attack vectors, if that is what you are asking for. Here are some of them that I can think of from my head:

  • Maybe the database link is actually a link to a hacked PDF file that will exploit some vulnerability in your Acrobat plugin (your PDF plugins are fixed, right? This is really a popular attack vector lately).

  • If it’s stuck, maybe it’s really lightning.

  • , , .

  • , , .

  • , , .

, . Postgres - (, postgres). , - .

"", , "" . , , .

+3

, , , , , PL/PythonU. , - , , , Postgres.

, , .

+1

All Articles