10 High
CVSS3
Attack Vector
NETWORK
Attack Complexity
LOW
Privileges Required
NONE
User Interaction
NONE
Scope
CHANGED
Confidentiality Impact
HIGH
Integrity Impact
HIGH
Availability Impact
HIGH
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H
7.8 High
AI Score
Confidence
Low
0.001 Low
EPSS
Percentile
47.3%
org.postgresql, postgresql is vulnerable to Sql Injection. The vulnerability is caused due to not escaping user provided literal parameter values in SQL query when using configuration option PreferQueryMode=SIMPLE
. An attacker can exploit this vulnerability to inject SQL to alter the query by crafting a specific payload , bypassing the protections that parameterized queries bring against SQL Injection attacks.
www.openwall.com/lists/oss-security/2024/04/02/6
github.com/advisories/GHSA-24rp-q3w6-vc56
github.com/advisories/GHSA-xfg6-62px-cxc2
github.com/pgjdbc/pgjdbc/commit/06abfb78a627277a580d4df825f210e96a4e14ee
github.com/pgjdbc/pgjdbc/security/advisories/GHSA-24rp-q3w6-vc56
lists.debian.org/debian-lts-announce/2024/05/msg00007.html
lists.fedoraproject.org/archives/list/[email protected]/message/TZQTSMESZD2RJ5XBPSXH3TIQVUW5DIUU/
security.netapp.com/advisory/ntap-20240419-0008/
www.enterprisedb.com/docs/jdbc_connector/latest/01_jdbc_rel_notes/
www.enterprisedb.com/docs/security/assessments/cve-2024-1597/
10 High
CVSS3
Attack Vector
NETWORK
Attack Complexity
LOW
Privileges Required
NONE
User Interaction
NONE
Scope
CHANGED
Confidentiality Impact
HIGH
Integrity Impact
HIGH
Availability Impact
HIGH
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H
7.8 High
AI Score
Confidence
Low
0.001 Low
EPSS
Percentile
47.3%