MGASA-2024-0120

Source
https://advisories.mageia.org/MGASA-2024-0120.html
Import Source
https://advisories.mageia.org/MGASA-2024-0120.json
JSON Data
https://api.test.osv.dev/v1/vulns/MGASA-2024-0120
Related
Published
2024-04-11T23:58:49Z
Modified
2024-04-11T23:43:38Z
Summary
Updated postgresql-jdbc packages fix security vulnerability
Details

pgjdbc, the PostgreSQL JDBC Driver, allows attacker to inject SQL if using PreferQueryMode=SIMPLE. Note this is not the default. In the default mode there is no vulnerability. A placeholder for a numeric value must be immediately preceded by a minus. There must be a second placeholder for a string value after the first placeholder; both must be on the same line. By constructing a matching string payload, the attacker can inject SQL to alter the query,bypassing the protections that parameterized queries bring against SQL Injection attacks. (CVE-2024-1597)

References
Credits

Affected packages