pgjdbc, the PostgreSQL JDBC Driver, allows attacker to inject SQL if using PreferQueryMode=SIMPLE. Note this is not the default. In the default mode there is no vulnerability. A placeholder for a numeric value must be immediately preceded by a minus. There must be a second placeholder for a string value after the first placeholder; both must be on the same line. By constructing a matching string payload, the attacker can inject SQL to alter the query,bypassing the protections that parameterized queries bring against SQL Injection attacks. Versions before 42.7.2, 42.6.1, 42.5.5, 42.4.4, 42.3.9, and 42.2.8 are affected. https://github.com/pgjdbc/pgjdbc/security/advisories/GHSA-24rp-q3w6-vc56 https://www.enterprisedb.com/docs/jdbc_connector/latest/01_jdbc_rel_notes/ https://www.enterprisedb.com/docs/security/assessments/cve-2024-1597/
Created postgresql-jdbc tracking bugs for this issue: Affects: fedora-all [bug 2266524]
Commits: https://github.com/pgjdbc/pgjdbc/commit/93b0fcb2711d9c1e3a2a03134369738a02a58b40 (REL42.7.2) https://github.com/pgjdbc/pgjdbc/commit/06abfb78a627277a580d4df825f210e96a4e14ee (REL42.7.2) https://github.com/pgjdbc/pgjdbc/commit/1b1d6b53eca90409af0069d5327d4fdf8d40a255 (REL42.5.5) https://github.com/pgjdbc/pgjdbc/commit/475e3e2af3033c666fc1c0015159b35455118ae5 (REL42.5.5) https://github.com/pgjdbc/pgjdbc/commit/b9b3777671c8a5cc580e1985f61337d39d47c730 (REL42.2.28) https://github.com/pgjdbc/pgjdbc/commit/990d63f6be401ab40de5eb303a75924c9e71903c (REL42.2.28)
This issue has been addressed in the following products: Red Hat Enterprise Linux 8 Via RHSA-2024:1435 https://access.redhat.com/errata/RHSA-2024:1435
This issue has been addressed in the following products: Red Hat Enterprise Linux 9 Via RHSA-2024:1436 https://access.redhat.com/errata/RHSA-2024:1436
This issue has been addressed in the following products: Red Hat Enterprise Linux 9.2 Extended Update Support Via RHSA-2024:1649 https://access.redhat.com/errata/RHSA-2024:1649
This issue has been addressed in the following products: Red Hat build of Quarkus 3.2.11 Via RHSA-2024:1662 https://access.redhat.com/errata/RHSA-2024:1662
This issue has been addressed in the following products: RHEL-8 based Middleware Containers Via RHSA-2024:1686 https://access.redhat.com/errata/RHSA-2024:1686
This issue has been addressed in the following products: Red Hat build of Quarkus 2.13.9.SP2 Via RHSA-2024:1797 https://access.redhat.com/errata/RHSA-2024:1797
This issue has been addressed in the following products: Red Hat Enterprise Linux 9.0 Extended Update Support Via RHSA-2024:1999 https://access.redhat.com/errata/RHSA-2024:1999
This issue has been addressed in the following products: Red Hat Enterprise Linux 8.2 Advanced Update Support Red Hat Enterprise Linux 8.2 Update Services for SAP Solutions Red Hat Enterprise Linux 8.2 Telecommunications Update Service Via RHSA-2024:2624 https://access.redhat.com/errata/RHSA-2024:2624
This issue has been addressed in the following products: Red Hat Enterprise Linux 8.8 Extended Update Support Via RHSA-2024:3313 https://access.redhat.com/errata/RHSA-2024:3313
This issue has been addressed in the following products: RHOSS-1.33-RHEL-8 Via RHSA-2024:4057 https://access.redhat.com/errata/RHSA-2024:4057
This issue has been addressed in the following products: Red Hat Enterprise Linux 8.4 Advanced Mission Critical Update Support Red Hat Enterprise Linux 8.4 Update Services for SAP Solutions Red Hat Enterprise Linux 8.4 Telecommunications Update Service Via RHSA-2024:4375 https://access.redhat.com/errata/RHSA-2024:4375
This issue has been addressed in the following products: Red Hat Enterprise Linux 8.6 Advanced Mission Critical Update Support Red Hat Enterprise Linux 8.6 Update Services for SAP Solutions Red Hat Enterprise Linux 8.6 Telecommunications Update Service Via RHSA-2024:4402 https://access.redhat.com/errata/RHSA-2024:4402
This issue has been addressed in the following products: Red Hat build of Apache Camel 4.4.1 for Spring Boot Via RHSA-2024:4884 https://access.redhat.com/errata/RHSA-2024:4884
This issue has been addressed in the following products: RHINT Camel-K 1.10.7 Via RHSA-2024:5056 https://access.redhat.com/errata/RHSA-2024:5056