Follow @Openwall on Twitter for new release announcements and other news
[<prev] [next>] [day] [month] [year] [list]
Message-ID: <10e79996-d2e7-4dae-bc0c-59b8850201e6@x17.eu>
Date: Wed, 3 Apr 2024 00:39:06 +0200
From: daniel <sd@....eu>
To: oss-security@...ts.openwall.com
Subject: CVE-2024-1597: PostgreSQL pgjdbc: SQL injection in non-default
 configuration

###
##	Summary
###
On the 21st of February 2024 a security advisory for the JDBC driver of 
PosgreSQL was published [1].
Which states: "SQL injection is possible when using the non-default 
connection property preferQueryMode=simple in combination with 
application code that has a vulnerable SQL that negates a parameter value."
Corresponding fixes were published at the 19th of February 2024.

###
##	Severity
###
The severity is critical with a CVSS score of 10 but several conditions 
must be met for successful exploitation.

Quote from [1]:
To exploit this behavior the following additional conditions must be met:

     A placeholder for a numeric value must be immediately preceded by a 
minus (i.e. -)
     There must be a second placeholder for a string value after the 
first placeholder on the same line.
     Both parameters must be user controlled.

###
##	Example from [1]
###
PreparedStatement stmt = conn.prepareStatement("SELECT -?, ?");
stmt.setInt(1, -1);
stmt.setString(2, "\nWHERE false --");
ResultSet rs = stmt.executeQuery();

The resulting SQL when operating in simple query mode would be:

SELECT --1,'
WHERE false --'

and the result after the fix applied:

SELECT -('-1'::int4), ('
WHERE false --')

###
##	Affected products and versions
###
pgJDBC [1]

     All versions prior to 42.7.2
     All versions prior to 42.6.1
     All versions prior to 42.5.5
     All versions prior to 42.4.4
     All versions prior to 42.3.9
     All versions prior to 42.2.28
     All versions prior to 42.2.28.jre7

EnterpriseDB pgJDBC [2]

     All versions prior to 42.5.4.2

and likely other products which bundle the above products like Atlassian 
Bamboo Data Center and Server [3] or IBM Maximo Application Suite[4].

###
##	Credit
###
Paul Gerste [5] has been credited as the reporter of the vulnerability [1].


References:
[1] https://github.com/advisories/GHSA-24rp-q3w6-vc56
[2] https://www.enterprisedb.com/docs/security/assessments/cve-2024-1597/
[3] https://jira.atlassian.com/browse/BAM-25716
[4] 
https://www.ibm.com/support/pages/security-bulletin-ibm-maximo-application-suite-uses-postgresql-4238jar-which-vulnerable-cve-2024-1597
[5] https://github.com/paul-gerste-sonarsource

Powered by blists - more mailing lists

Please check out the Open Source Software Security Wiki, which is counterpart to this mailing list.

Confused about mailing lists and their use? Read about mailing lists on Wikipedia and check out these guidelines on proper formatting of your messages.