Lookup for vulnerabilities affecting packages.

Vulnerability_idVCID-rwwd-8qgf-f3ac
Summary
Duplicate Advisory: SQL injection in pgjdbc
## Duplicate Advisory
This advisory has been withdrawn because it is a duplicate of GHSA-24rp-q3w6-vc56. This link is maintained to preserve external references.

## Original Description
pgjdbc, the PostgreSQL JDBC Driver, allows attacker to inject SQL if using PreferQueryMode=SIMPLE. Note this is not the default. In the default mode there is no vulnerability. A placeholder for a numeric value must be immediately preceded by a minus. There must be a second placeholder for a string value after the first placeholder; both must be on the same line. By constructing a matching string payload, the attacker can inject SQL to alter the query,bypassing the protections that parameterized queries bring against SQL Injection attacks. Versions before 42.7.2, 42.6.1, 42.5.5, 42.4.4, 42.3.9, and 42.2.8 are affected.
Aliases
0
alias GHSA-xfg6-62px-cxc2
Fixed_packages
0
url pkg:maven/org.postgresql/postgresql@42.2.8
purl pkg:maven/org.postgresql/postgresql@42.2.8
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-7p16-8nb5-kucz
1
vulnerability VCID-hpc5-vtmd-gub5
2
vulnerability VCID-qub7-qp14-uqcg
3
vulnerability VCID-uzj4-puvz-zfgh
4
vulnerability VCID-vdtn-ek54-nqh6
resource_url http://public2.vulnerablecode.io/packages/pkg:maven/org.postgresql/postgresql@42.2.8
1
url pkg:maven/org.postgresql/postgresql@42.3.9
purl pkg:maven/org.postgresql/postgresql@42.3.9
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:maven/org.postgresql/postgresql@42.3.9
2
url pkg:maven/org.postgresql/postgresql@42.4.4
purl pkg:maven/org.postgresql/postgresql@42.4.4
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:maven/org.postgresql/postgresql@42.4.4
3
url pkg:maven/org.postgresql/postgresql@42.5.5
purl pkg:maven/org.postgresql/postgresql@42.5.5
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:maven/org.postgresql/postgresql@42.5.5
4
url pkg:maven/org.postgresql/postgresql@42.6.1
purl pkg:maven/org.postgresql/postgresql@42.6.1
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:maven/org.postgresql/postgresql@42.6.1
5
url pkg:maven/org.postgresql/postgresql@42.7.2
purl pkg:maven/org.postgresql/postgresql@42.7.2
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:maven/org.postgresql/postgresql@42.7.2
Affected_packages
0
url pkg:maven/org.postgresql/postgresql@42.3.0
purl pkg:maven/org.postgresql/postgresql@42.3.0
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-6r4u-tem9-vkey
1
vulnerability VCID-7p16-8nb5-kucz
2
vulnerability VCID-ba8g-gn36-7bdp
3
vulnerability VCID-hpc5-vtmd-gub5
4
vulnerability VCID-qub7-qp14-uqcg
5
vulnerability VCID-rwwd-8qgf-f3ac
6
vulnerability VCID-uzj4-puvz-zfgh
resource_url http://public2.vulnerablecode.io/packages/pkg:maven/org.postgresql/postgresql@42.3.0
1
url pkg:maven/org.postgresql/postgresql@42.4.0
purl pkg:maven/org.postgresql/postgresql@42.4.0
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-6r4u-tem9-vkey
1
vulnerability VCID-ba8g-gn36-7bdp
2
vulnerability VCID-qub7-qp14-uqcg
3
vulnerability VCID-rwwd-8qgf-f3ac
resource_url http://public2.vulnerablecode.io/packages/pkg:maven/org.postgresql/postgresql@42.4.0
2
url pkg:maven/org.postgresql/postgresql@42.5.0
purl pkg:maven/org.postgresql/postgresql@42.5.0
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-6r4u-tem9-vkey
1
vulnerability VCID-qub7-qp14-uqcg
2
vulnerability VCID-rwwd-8qgf-f3ac
resource_url http://public2.vulnerablecode.io/packages/pkg:maven/org.postgresql/postgresql@42.5.0
3
url pkg:maven/org.postgresql/postgresql@42.6.0
purl pkg:maven/org.postgresql/postgresql@42.6.0
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-6r4u-tem9-vkey
1
vulnerability VCID-rwwd-8qgf-f3ac
resource_url http://public2.vulnerablecode.io/packages/pkg:maven/org.postgresql/postgresql@42.6.0
4
url pkg:maven/org.postgresql/postgresql@42.7.0
purl pkg:maven/org.postgresql/postgresql@42.7.0
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-6r4u-tem9-vkey
1
vulnerability VCID-rwwd-8qgf-f3ac
resource_url http://public2.vulnerablecode.io/packages/pkg:maven/org.postgresql/postgresql@42.7.0
References
0
reference_url https://github.com/pgjdbc/pgjdbc
reference_id
reference_type
scores
0
value 10.0
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H
1
value CRITICAL
scoring_system generic_textual
scoring_elements
url https://github.com/pgjdbc/pgjdbc
1
reference_url https://github.com/pgjdbc/pgjdbc/commit/06abfb78a627277a580d4df825f210e96a4e14ee
reference_id
reference_type
scores
0
value 10.0
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H
1
value CRITICAL
scoring_system generic_textual
scoring_elements
url https://github.com/pgjdbc/pgjdbc/commit/06abfb78a627277a580d4df825f210e96a4e14ee
2
reference_url https://github.com/pgjdbc/pgjdbc/commit/93b0fcb2711d9c1e3a2a03134369738a02a58b40
reference_id
reference_type
scores
0
value 10.0
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H
1
value CRITICAL
scoring_system generic_textual
scoring_elements
url https://github.com/pgjdbc/pgjdbc/commit/93b0fcb2711d9c1e3a2a03134369738a02a58b40
3
reference_url https://github.com/pgjdbc/pgjdbc/security/advisories/GHSA-24rp-q3w6-vc56
reference_id
reference_type
scores
0
value 10.0
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H
1
value CRITICAL
scoring_system generic_textual
scoring_elements
url https://github.com/pgjdbc/pgjdbc/security/advisories/GHSA-24rp-q3w6-vc56
4
reference_url https://lists.debian.org/debian-lts-announce/2024/05/msg00007.html
reference_id
reference_type
scores
0
value 10.0
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H
1
value CRITICAL
scoring_system generic_textual
scoring_elements
url https://lists.debian.org/debian-lts-announce/2024/05/msg00007.html
5
reference_url https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/TZQTSMESZD2RJ5XBPSXH3TIQVUW5DIUU
reference_id
reference_type
scores
0
value 10.0
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H
1
value CRITICAL
scoring_system generic_textual
scoring_elements
url https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/TZQTSMESZD2RJ5XBPSXH3TIQVUW5DIUU
6
reference_url https://nvd.nist.gov/vuln/detail/CVE-2024-1597
reference_id
reference_type
scores
0
value 10.0
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H
1
value CRITICAL
scoring_system generic_textual
scoring_elements
url https://nvd.nist.gov/vuln/detail/CVE-2024-1597
7
reference_url https://security.netapp.com/advisory/ntap-20240419-0008
reference_id
reference_type
scores
0
value 10.0
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H
1
value CRITICAL
scoring_system generic_textual
scoring_elements
url https://security.netapp.com/advisory/ntap-20240419-0008
8
reference_url https://www.enterprisedb.com/docs/jdbc_connector/latest/01_jdbc_rel_notes
reference_id
reference_type
scores
0
value 10.0
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H
1
value CRITICAL
scoring_system generic_textual
scoring_elements
url https://www.enterprisedb.com/docs/jdbc_connector/latest/01_jdbc_rel_notes
9
reference_url https://www.enterprisedb.com/docs/security/assessments/cve-2024-1597
reference_id
reference_type
scores
0
value 10.0
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H
1
value CRITICAL
scoring_system generic_textual
scoring_elements
url https://www.enterprisedb.com/docs/security/assessments/cve-2024-1597
10
reference_url http://www.openwall.com/lists/oss-security/2024/04/02/6
reference_id
reference_type
scores
0
value 10.0
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H
1
value CRITICAL
scoring_system generic_textual
scoring_elements
url http://www.openwall.com/lists/oss-security/2024/04/02/6
11
reference_url https://github.com/advisories/GHSA-xfg6-62px-cxc2
reference_id GHSA-xfg6-62px-cxc2
reference_type
scores
0
value CRITICAL
scoring_system cvssv3.1_qr
scoring_elements
url https://github.com/advisories/GHSA-xfg6-62px-cxc2
Weaknesses
0
cwe_id 89
name Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')
description The product constructs all or part of an SQL command using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify the intended SQL command when it is sent to a downstream component.
1
cwe_id 937
name OWASP Top Ten 2013 Category A9 - Using Components with Known Vulnerabilities
description Weaknesses in this category are related to the A9 category in the OWASP Top Ten 2013.
2
cwe_id 1035
name OWASP Top Ten 2017 Category A9 - Using Components with Known Vulnerabilities
description Weaknesses in this category are related to the A9 category in the OWASP Top Ten 2017.
Exploits
Severity_range_score9.0 - 10.0
Exploitability0.5
Weighted_severity9.0
Risk_score4.5
Resource_urlhttp://public2.vulnerablecode.io/vulnerabilities/VCID-rwwd-8qgf-f3ac