[Forgot Password]
Login  Register Subscribe

30480

 
 

423868

 
 

253164

 
 

909

 
 

197077

 
 

282

Paid content will be excluded from the download.


Download | Alert*
OVAL

SQL injection vulnerability in libpgjava - CVE-2024-1597

ID: oval:org.secpod.oval:def:98272Date: (C)2024-03-05   (M)2024-04-25
Class: VULNERABILITYFamily: unix




pgjdbc, the PostgreSQL JDBC Driver, allows attacker to inject SQL if using PreferQueryMode=SIMPLE. Note this is not the default. In the default mode there is no vulnerability. A placeholder for a numeric value must be immediately preceded by a minus. There must be a second placeholder for a string value after the first placeholder; both must be on the same line. By constructing a matching string payload, the attacker can inject SQL to alter the query,bypassing the protections that parameterized queries bring against SQL Injection attacks. Versions before 42.7.2, 42.6.1, 42.5.5, 42.4.4, 42.3.9, and 42.2.8 are affected.

Platform:
Debian 10.x
Debian 11.x
Debian 12.x
Product:
libpostgresql-jdbc-java
Reference:
CVE-2024-1597
CVE    1
CVE-2024-1597
CPE    3
cpe:/o:debian:debian_linux:10.x
cpe:/a:postgresql:libpostgresql-jdbc-java
cpe:/o:debian:debian_linux:11.x

© SecPod Technologies