Description Preview
The pgjdbc, the PostgreSQL JDBC Driver, has a vulnerability that allows an attacker to inject SQL if using PreferQueryMode=SIMPLE. This is not the default mode and in the default mode, there is no vulnerability. A placeholder for a numeric value must be immediately preceded by a minus. There must be a second placeholder for a string value after the first placeholder; both must be on the same line. By constructing a matching string payload, the attacker can inject SQL to alter the query, bypassing the protections that parameterized queries bring against SQL Injection attacks. Versions before 42.7.2, 42.6.1, 42.5.5, 42.4.4, 42.3.9, and 42.2.28 are affected.
Overview
The vulnerability is identified as CVE-2024-1597 and was published on 2024-02-19. The vulnerability is critical with a CVSS base score of 10. The vulnerability is due to improper neutralization of special elements used in an SQL command, leading to SQL Injection. The vulnerability can be exploited over the network with low complexity and does not require user interaction or privileges.
Remediation
Users are advised not to use the SimpleQuery mode. They should update their pgjdbc to versions 42.7.2, 42.6.1, 42.5.5, 42.4.4, 42.3.9, or 42.2.28 and above to mitigate this vulnerability.
References
Industry ExposureMost to leastThis section illustrates the prevalence of a specific Common Vulnerabilities and Exposures (CVE) across various industries based on customer reports. The ranking displays industries from the most to least affected by this particular vulnerability, offering valuable insight into where this CVE has been most frequently observed. This information can help organizations within these sectors prioritize their security efforts, understand their relative risk exposure compared to their peers, and focus remediation strategies where they are most needed. By understanding the industry-specific impact, organizations can make more informed decisions regarding patching, resource allocation, and overall risk management related to this CVE.
This section illustrates the prevalence of a specific Common Vulnerabilities and Exposures (CVE) across various industries based on customer reports. The ranking displays industries from the most to least affected by this particular vulnerability, offering valuable insight into where this CVE has been most frequently observed. This information can help organizations within these sectors prioritize their security efforts, understand their relative risk exposure compared to their peers, and focus remediation strategies where they are most needed. By understanding the industry-specific impact, organizations can make more informed decisions regarding patching, resource allocation, and overall risk management related to this CVE.
- ManufacturingManufacturing
- Public AdministrationPublic Administration
- Professional, Scientific, & Technical ServicesProfessional, Scientific, & Technical Services
- Health Care & Social AssistanceHealth Care & Social Assistance
- Educational ServicesEducational Services
- Retail TradeRetail Trade
- Transportation & WarehousingTransportation & Warehousing
- Arts, Entertainment & RecreationArts, Entertainment & Recreation
- Finance and InsuranceFinance and Insurance
- Management of Companies & EnterprisesManagement of Companies & Enterprises
- Other Services (except Public Administration)Other Services (except Public Administration)
- UtilitiesUtilities
- Wholesale TradeWholesale Trade
- Accommodation & Food ServicesAccommodation & Food Services
- Administrative, Support, Waste Management & Remediation ServicesAdministrative, Support, Waste Management & Remediation Services
- Agriculture, Forestry Fishing & HuntingAgriculture, Forestry Fishing & Hunting
- ConstructionConstruction
- InformationInformation
- MiningMining
- Real Estate Rental & LeasingReal Estate Rental & Leasing