GHSA-x3wm-hffr-chwm

Suggest an improvement
Source
https://github.com/advisories/GHSA-x3wm-hffr-chwm
Import Source
https://github.com/github/advisory-database/blob/main/advisories/github-reviewed/2024/05/GHSA-x3wm-hffr-chwm/GHSA-x3wm-hffr-chwm.json
JSON Data
https://api.osv.dev/v1/vulns/GHSA-x3wm-hffr-chwm
Aliases
Published
2024-05-15T17:10:49Z
Modified
2024-10-08T04:26:56.903515Z
Severity
  • 10.0 (Critical) CVSS_V3 - CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H CVSS Calculator
Summary
Amazon JDBC Driver for Redshift SQL Injection via line comment generation
Details

Impact

SQL injection is possible when using the non-default connection property preferQueryMode=simple in combination with application code which has a vulnerable SQL that negates a parameter value.

There is no vulnerability in the driver when using the default, extended query mode. Note that preferQueryMode is not a supported parameter in Redshift JDBC driver, and is inherited code from Postgres JDBC driver. Users who do not override default settings to utilize this unsupported query mode are not affected.

Patch

This issue is patched in driver version 2.1.0.28.

Workarounds

Do not use the connection property preferQueryMode=simple. (NOTE: If you do not explicitly specify a query mode, then you are using the default of extended query mode and are not affected by this issue.)

References

Similar to finding in Postgres JDBC: https://github.com/pgjdbc/pgjdbc/security/advisories/GHSA-24rp-q3w6-vc56

If you have any questions or comments about this advisory, we ask that you contact AWS Security via our vulnerability reporting page or directly via email to aws-security@amazon.com. Please do not create a public GitHub issue.

References

Affected packages

Maven / com.amazon.redshift:redshift-jdbc42

Package

Name
com.amazon.redshift:redshift-jdbc42
View open source insights on deps.dev
Purl
pkg:maven/com.amazon.redshift/redshift-jdbc42

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
2.1.0.28

Affected versions

2.*

2.0.0.3
2.0.0.4
2.0.0.5
2.0.0.6
2.0.0.7
2.1.0.1
2.1.0.2
2.1.0.3
2.1.0.4
2.1.0.5
2.1.0.6
2.1.0.7
2.1.0.8
2.1.0.9
2.1.0.10
2.1.0.11
2.1.0.12
2.1.0.13
2.1.0.14
2.1.0.15
2.1.0.16
2.1.0.17
2.1.0.18
2.1.0.19
2.1.0.20
2.1.0.21
2.1.0.22
2.1.0.23
2.1.0.24
2.1.0.25
2.1.0.26
2.1.0.27