The following documentation comment has been logged on the website: Page: https://www.postgresql.org/docs/13/pgcrypto.html Description:
Hi, in "F.25.1.1. digest()" you suggest: CREATE OR REPLACE FUNCTION sha1(bytea) returns text AS $$ SELECT encode(digest($1, 'sha1'), 'hex') $$ LANGUAGE SQL STRICT IMMUTABLE; While this is a great example, it may expose a database app to vulnerabilities if the attacker succeeds in overriding the function sha1(...) in the app's user context (schema). This may or may not require administrative privileges. Explicitly putting it into the "postgres" schema and calling it using "postgres.sha1(...)" could mitigate the risk in such a way that administrative privileges are required. Do you have an even better solution to secure it? :-) Beat