Lucene search

K
vulnrichmentGitHub_MVULNRICHMENT:CVE-2024-27289
HistoryMar 06, 2024 - 6:28 p.m.

CVE-2024-27289 pgx SQL Injection via Line Comment Creation

2024-03-0618:28:12
CWE-89
GitHub_M
github.com
6
cve-2024-27289
sql injection
postgresql driver

CVSS3

8.1

Attack Vector

NETWORK

Attack Complexity

HIGH

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H

AI Score

8.4

Confidence

High

SSVC

Exploitation

poc

Automatable

no

Technical Impact

total

pgx is a PostgreSQL driver and toolkit for Go. Prior to version 4.18.2, SQL injection can occur when all of the following conditions are met: the non-default simple protocol is used; a placeholder for a numeric value must be immediately preceded by a minus; there must be a second placeholder for a string value after the first placeholder; both must be on the same line; and both parameter values must be user-controlled. The problem is resolved in v4.18.2. As a workaround, do not use the simple protocol or do not place a minus directly before a placeholder.

ADP Affected

[
  {
    "cpes": [
      "cpe:2.3:a:jackc:pgx:*:*:*:*:*:*:*:*"
    ],
    "vendor": "jackc",
    "product": "pgx",
    "versions": [
      {
        "status": "affected",
        "version": "0",
        "lessThan": "4.18.2",
        "versionType": "custom"
      }
    ],
    "defaultStatus": "unknown"
  }
]

CVSS3

8.1

Attack Vector

NETWORK

Attack Complexity

HIGH

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H

AI Score

8.4

Confidence

High

SSVC

Exploitation

poc

Automatable

no

Technical Impact

total