CVE-2024-1597
Postgresql
CVE-2024-1597 is a critical SQL Injection vulnerability in pgjdbc, the PostgreSQL JDBC Driver. This vulnerability allows attackers to inject SQL code if the application is using the non-default PreferQueryMode=SIMPLE. SOCRadar's Vulnerability Risk Score (SVRS) of 88 indicates that this is a critical vulnerability, requiring immediate attention. Attackers can bypass parameterized query protections by crafting specific string payloads with carefully placed numeric and string placeholders on the same line. This injected SQL can then alter the intended query, leading to unauthorized data access or modification.
The vulnerability is present in pgjdbc versions prior to 42.7.2, 42.6.1, 42.5.5, 42.4.4, 42.3.9, and 42.2.28. Given the high CVSS score of 9.8 and the "In The Wild" tag, organizations using affected versions of pgjdbc with PreferQueryMode=SIMPLE enabled are at immediate risk of data breaches and should upgrade immediately. The high SVRS further emphasizes the urgency to patch or mitigate this security risk.
Description
CVE-2024-1597 is a SQL injection vulnerability in pgjdbc, the PostgreSQL JDBC Driver. This vulnerability allows an attacker to inject SQL if using PreferQueryMode=SIMPLE. The default mode is not vulnerable. By constructing a matching string payload, the attacker can inject SQL to alter the query, bypassing the protections that parameterized queries bring against SQL Injection attacks.
Key Insights
- The CVSS score of 10 indicates that this vulnerability is critical and requires immediate attention.
- The SVRS score of 56 indicates that this vulnerability is moderately severe and requires attention within 24-48 hours.
- This vulnerability is actively exploited by hackers in the wild.
Mitigation Strategies
- Update to pgjdbc version 42.7.2, 42.6.1, 42.5.5, 42.4.4, 42.3.9, or 42.2.8.
- Use parameterized queries to prevent SQL injection attacks.
- Implement input validation to prevent attackers from submitting malicious input.
Additional Information
- The Cybersecurity and Infrastructure Security Agency (CISA) has warned of this vulnerability, calling for immediate and necessary measures.
- If users have additional queries regarding this incident, they can use the 'Ask to Analyst' feature, contact SOCRadar directly, or open a support ticket for more information if necessary.
Indicators of Compromise
Exploits
News
Social Media
Affected Software
References
CWE Details
CVE Radar
Real-time CVE Intelligence & Vulnerability Management Platform
CVE Radar provides comprehensive vulnerability intelligence by monitoring CVE databases, security advisories, and threat feeds. Get instant updates on new vulnerabilities, exploit details, and mitigation strategies specific to your assets.