Опубликовано: 04 мар. 2024
Источник: github
Github: Прошло ревью
CVSS4: 8.1
CVSS3: 9.8
Описание
pgproto3 SQL Injection via Protocol Message Size Overflow
Impact
SQL injection can occur if an attacker can cause a single query or bind message to exceed 4 GB in size. An integer overflow in the calculated message size can cause the one large message to be sent as multiple messages under the attacker's control.
Patches
The problem is resolved in v2.3.3
Workarounds
Reject user input large enough to cause a single query or bind message to exceed 4 GB in size.
Ссылки
- https://github.com/jackc/pgproto3/security/advisories/GHSA-7jwh-3vrq-q3m8
- https://github.com/jackc/pgx/security/advisories/GHSA-mrww-27vc-gghv
- https://nvd.nist.gov/vuln/detail/CVE-2024-27304
- https://github.com/jackc/pgproto3/commit/945c2126f6db8f3bea7eeebe307c01fe92bca007
- https://github.com/jackc/pgx/commit/adbb38f298c76e283ffc7c7a3f571036fea47fd4
- https://github.com/jackc/pgx/commit/c543134753a0c5d22881c12404025724cb05ffd8
- https://github.com/jackc/pgx/commit/f94eb0e2f96782042c96801b5ac448f44f0a81df
Пакеты
Наименование
github.com/jackc/pgproto3
go
Затронутые версииВерсия исправления
< 2.3.3
2.3.3
Наименование
github.com/jackc/pgproto3/v2
go
Затронутые версииВерсия исправления
< 2.3.3
2.3.3
8.1 High
CVSS4
9.8 Critical
CVSS3
Дефекты
CWE-190
CWE-89
8.1 High
CVSS4
9.8 Critical
CVSS3
Дефекты
CWE-190
CWE-89