Lucene search

K
vulnrichmentPostgreSQLVULNRICHMENT:CVE-2024-1597
HistoryFeb 19, 2024 - 12:58 p.m.

CVE-2024-1597 pgjdbc SQL Injection via line comment generation

2024-02-1912:58:48
CWE-89
PostgreSQL
github.com
6
cve-2024-1597
pgjdbc
sql injection
preferquerymode
pgjdbc vulnerability
postgresql jdbc driver
parameterized queries

CVSS3

10

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

CHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H

AI Score

7.8

Confidence

Low

SSVC

Exploitation

poc

Automatable

yes

Technical Impact

total

pgjdbc, the PostgreSQL JDBC Driver, allows attacker to inject SQL if using PreferQueryMode=SIMPLE. Note this is not the default. In the default mode there is no vulnerability. A placeholder for a numeric value must be immediately preceded by a minus. There must be a second placeholder for a string value after the first placeholder; both must be on the same line. By constructing a matching string payload, the attacker can inject SQL to alter the query,bypassing the protections that parameterized queries bring against SQL Injection attacks. Versions before 42.7.2, 42.6.1, 42.5.5, 42.4.4, 42.3.9, and 42.2.28 are affected.

ADP Affected

[
  {
    "cpes": [
      "cpe:2.3:a:pgjdbc:pgjdbc:*:*:*:*:*:*:*:*"
    ],
    "vendor": "pgjdbc",
    "product": "pgjdbc",
    "versions": [
      {
        "status": "affected",
        "version": "0",
        "lessThan": "42.7.2",
        "versionType": "custom"
      },
      {
        "status": "affected",
        "version": "0",
        "lessThan": "42.6.1",
        "versionType": "custom"
      },
      {
        "status": "affected",
        "version": "0",
        "lessThan": "42.5.5",
        "versionType": "custom"
      },
      {
        "status": "affected",
        "version": "0",
        "lessThan": "42.4.4",
        "versionType": "custom"
      },
      {
        "status": "affected",
        "version": "0",
        "lessThan": "42.3.9",
        "versionType": "custom"
      },
      {
        "status": "affected",
        "version": "0",
        "lessThan": "42.2.28",
        "versionType": "custom"
      }
    ],
    "defaultStatus": "unknown"
  }
]

CVSS3

10

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

CHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H

AI Score

7.8

Confidence

Low

SSVC

Exploitation

poc

Automatable

yes

Technical Impact

total