SQL injection can occur when all of the following conditions are met:
e.g.
Simple mode must be enabled:
// connection string includes "prefer_simple_protocol=true"
// or
// directly enabled in code
config.ConnConfig.PreferSimpleProtocol = true
Parameterized query:
SELECT * FROM example WHERE result=-$1 OR name=$2;
Parameter values:
$1 => -42
$2 => "foo\n 1 AND 1=0 UNION SELECT * FROM secrets; --"
Resulting query after preparation:
SELECT * FROM example WHERE result=--42 OR name= 'foo
1 AND 1=0 UNION SELECT * FROM secrets; --';
The problem is resolved in v4.18.2.
Do not use the simple protocol or do not place a minus directly before a placeholder.
{
"nvd_published_at": "2024-03-06T19:15:08Z",
"severity": "HIGH",
"github_reviewed": true,
"cwe_ids": [
"CWE-89"
],
"github_reviewed_at": "2024-03-04T20:13:11Z"
}