跳转到帖子

Debian: CVE-2024-1597: libpgjava -- security update

recommended_posts

发布于
  • 超级管理员

Debian: CVE-2024-1597: libpgjava -- security update

Severity
10
CVSS
(AV:N/AC:L/Au:N/C:C/I:C/A:C)
Published
02/19/2024
Created
05/13/2024
Added
05/13/2024
Modified
01/28/2025

Description

pgjdbc, the PostgreSQL JDBC Driver, allows attacker to inject SQL if using PreferQueryMode=SIMPLE. Note this is not the default. In the default mode there is no vulnerability. A placeholder for a numeric value must be immediately preceded by a minus. There must be a second placeholder for a string value after the first placeholder; both must be on the same line. By constructing a matching string payload, the attacker can inject SQL to alter the query,bypassing the protections that parameterized queries bring against SQL Injection attacks. Versions before 42.7.2, 42.6.1, 42.5.5, 42.4.4, 42.3.9, and 42.2.28 are affected.

Solution(s)

  • debian-upgrade-libpgjava

References

  • https://attackerkb.com/topics/cve-2024-1597
  • CVE - 2024-1597
  • DLA-3812-1
  • 查看数 707
  • 已创建
  • 最后回复

参与讨论

你可立刻发布并稍后注册。 如果你有帐户,立刻登录发布帖子。
注意:你的帖子需要版主批准后才能看到。

游客
回帖…