GHSA-jc69-hjw2-fm86

Suggest an improvement
Source
https://github.com/advisories/GHSA-jc69-hjw2-fm86
Import Source
https://github.com/github/advisory-database/blob/main/advisories/github-reviewed/2022/10/GHSA-jc69-hjw2-fm86/GHSA-jc69-hjw2-fm86.json
JSON Data
https://api.osv.dev/v1/vulns/GHSA-jc69-hjw2-fm86
Aliases
Published
2022-10-12T18:23:36Z
Modified
2023-11-08T04:10:33.160067Z
Severity
  • 7.1 (High) CVSS_V3 - CVSS:3.1/AV:N/AC:H/PR:L/UI:R/S:C/C:H/I:L/A:L CVSS Calculator
Summary
com.amazon.redshift:redshift-jdbc42 vulnerable to remote command execution
Details

Impact

A potential remote command execution issue exists within redshift-jdbc42 versions 2.1.0.7 and below. When plugins are used with the driver, it instantiates plugin instances based on Java class names provided via the sslhostnameverifier, socketFactory, sslfactory, and sslpasswordcallback connection properties. In affected versions, the driver does not verify if a plugin class implements the expected interface before instantiatiaton. This can lead to loading of arbitrary Java classes, which a knowledgeable attacker with control over the JDBC URL can use to achieve remote code execution.

Patches

This issue is patched within redshift-jdbc-42 2.1.0.8 and above.

Workarounds

We advise customers using plugins to upgrade to redshift-jdbc42 version 2.1.0.8 or above. There are no known workarounds for this issue.

For more information

If you have any questions or comments about this advisory, please contact AWS Security at aws-security@amazon.com.

Database specific
{
    "nvd_published_at": null,
    "github_reviewed_at": "2022-10-12T18:23:36Z",
    "severity": "HIGH",
    "github_reviewed": true,
    "cwe_ids": [
        "CWE-704"
    ]
}
References

Affected packages

Maven / com.amazon.redshift:redshift-jdbc42

Package

Name
com.amazon.redshift:redshift-jdbc42
View open source insights on deps.dev
Purl
pkg:maven/com.amazon.redshift/redshift-jdbc42

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
2.1.0.8

Affected versions

2.*

2.0.0.3
2.0.0.4
2.0.0.5
2.0.0.6
2.0.0.7
2.1.0.1
2.1.0.2
2.1.0.3
2.1.0.4
2.1.0.5
2.1.0.6
2.1.0.7