Query goal: | Find as to whether the database access by users (applications) can take place thanks to PUBLIC privileges, i.e., find as to whether PUBLIC (all current and future users) has CONNECT privilege in the database. PUBLIC gets the privilege by default. |
Query type: | Problem detection (Each row in the result could represent a flaw in the design) |
Query reliability: | High (Few or no false-positive results) |
Query license: | MIT License |
Fixing suggestion: | Revoke the privileges from PUBLIC. Grant connect privilege to the users that correspond to applications. |
Data source: | system catalog only |
SQL query: | Click on query to copy it
WITH db_privs AS (SELECT unnest(datacl)::text AS priv FROM pg_database WHERE datname=current_database()) SELECT 'Database can be connected thanks to the connection privilege to PUBLIC' AS mistake WHERE NOT EXISTS (SELECT * FROM db_privs) OR EXISTS (SELECT * FROM db_privs WHERE priv~'^=[[:alpha:]]*c'); |
SQL query | Description |
---|---|
WITH db_privs AS (SELECT unnest(datacl)::text AS priv FROM pg_database WHERE datname=current_database()) SELECT format('REVOKE CONNECT, TEMP ON DATABASE %1$I FROM PUBLIC;', current_database()) AS statements WHERE NOT EXISTS (SELECT * FROM db_privs) OR EXISTS (SELECT * FROM db_privs WHERE priv~'^=[[:alpha:]]*c'); | Revoke the CONNECT and TEMPORARY privileges from PUBLIC. |
Collection name | Collection description |
---|---|
Find problems automatically | Queries, that results point to problems in the database. Each query in the collection produces an initial assessment. However, a human reviewer has the final say as to whether there is a problem or not . |
Category name | Category description |
---|---|
Security | Queries of this category provide information about the security measures. |