Lucene search

K
cvelistGitHub_MCVELIST:CVE-2024-27304
HistoryMar 06, 2024 - 7:07 p.m.

CVE-2024-27304 pgx SQL Injection via Protocol Message Size Overflow

2024-03-0619:07:08
CWE-89
CWE-190
GitHub_M
www.cve.org
8
sql injection
protocol message size overflow
integer overflow
postgresql
go
version 4.18.2
version 5.5.4
workaround

CVSS3

9.8

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H

AI Score

10

Confidence

High

EPSS

0

Percentile

10.3%

pgx is a PostgreSQL driver and toolkit for Go. SQL injection can occur if an attacker can cause a single query or bind message to exceed 4 GB in size. An integer overflow in the calculated message size can cause the one large message to be sent as multiple messages under the attacker’s control. The problem is resolved in v4.18.2 and v5.5.4. As a workaround, reject user input large enough to cause a single query or bind message to exceed 4 GB in size.

CNA Affected

[
  {
    "vendor": "jackc",
    "product": "pgx",
    "versions": [
      {
        "version": "< 4.18.2",
        "status": "affected"
      },
      {
        "version": ">= 5.0.0, < 5.5.4",
        "status": "affected"
      }
    ]
  }
]

CVSS3

9.8

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H

AI Score

10

Confidence

High

EPSS

0

Percentile

10.3%