CVE-2024-27289
CVSS V2 None
CVSS V3 None
Description
pgx is a PostgreSQL driver and toolkit for Go. Prior to version 4.18.2, SQL injection can occur when all of the following conditions are met: the non-default simple protocol is used; a placeholder for a numeric value must be immediately preceded by a minus; there must be a second placeholder for a string value after the first placeholder; both must be on the same line; and both parameter values must be user-controlled. The problem is resolved in v4.18.2. As a workaround, do not use the simple protocol or do not place a minus directly before a placeholder.
Overview
- CVE ID
- CVE-2024-27289
- Assigner
- GitHub_M
- Vulnerability Status
- PUBLISHED
- Published Version
- 2024-03-06T18:28:12.291Z
- Last Modified Date
- 2024-03-06T18:28:12.291Z
Weakness Enumerations
References
Reference URL | Reference Tags |
---|---|
https://github.com/jackc/pgx/security/advisories/GHSA-m7wr-2xf7-cm9p | x_refsource_CONFIRM |
https://github.com/jackc/pgx/commit/f94eb0e2f96782042c96801b5ac448f44f0a81df | x_refsource_MISC |
Sources
Source Name | Source URL |
---|---|
NIST | https://nvd.nist.gov/vuln/detail/CVE-2024-27289 |
MITRE | https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-27289 |
History
Created | Old Value | New Value | Data Type | Notes |
---|---|---|---|---|
2024-06-26 01:26:58 | Added to TrackCVE |