Lucene search

K
githubGitHub Advisory DatabaseGHSA-MRWW-27VC-GGHV
HistoryMar 04, 2024 - 8:43 p.m.

pgx SQL Injection via Protocol Message Size Overflow

2024-03-0420:43:24
CWE-89
CWE-190
GitHub Advisory Database
github.com
22
sql injection
protocol message
integer overflow
message size
attacker control
patch
workaround
software

CVSS3

9.8

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H

AI Score

7.2

Confidence

High

EPSS

0

Percentile

10.3%

Impact

SQL injection can occur if an attacker can cause a single query or bind message to exceed 4 GB in size. An integer overflow in the calculated message size can cause the one large message to be sent as multiple messages under the attacker’s control.

Patches

The problem is resolved in v4.18.2 and v5.5.4.

Workarounds

Reject user input large enough to cause a single query or bind message to exceed 4 GB in size.

Affected configurations

Vulners
Node
jackcpgxRange5.0.05.5.4
OR
jackcpgxRange<4.18.2
OR
jackcpgxRange5.0.05.5.4
OR
jackcpgxRange<4.18.2
VendorProductVersionCPE
jackcpgx*cpe:2.3:a:jackc:pgx:*:*:*:*:*:*:*:*

CVSS3

9.8

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H

AI Score

7.2

Confidence

High

EPSS

0

Percentile

10.3%