Plateforme
java
Composant
com.amazon.redshift:redshift-jdbc42
Corrigé dans
2.1.1
2.1.0.28
CVE-2024-32888 describes a SQL Injection vulnerability discovered in the Redshift JDBC driver. This flaw allows attackers to inject malicious SQL code, potentially leading to unauthorized data access or modification. The vulnerability affects versions of the driver up to and including 2.1.0.9. A patch is available in version 2.1.0.28.
The impact of this SQL Injection vulnerability is significant. An attacker who can successfully exploit this flaw can potentially bypass security controls and execute arbitrary SQL queries against the Redshift database. This could lead to unauthorized access to sensitive data, including personally identifiable information (PII), financial records, and business-critical data. Depending on the database permissions, an attacker could also modify or delete data, leading to data corruption and service disruption. The use of preferQueryMode=simple is a key factor in exploitability, as it bypasses the driver's default security measures. This vulnerability shares similarities with other SQL Injection vulnerabilities where parameter validation is insufficient, potentially allowing attackers to manipulate query logic.
CVE-2024-32888 was publicly disclosed on May 15, 2024. The vulnerability's severity is rated as CRITICAL (CVSS score 10.0). There is currently no indication of active exploitation campaigns targeting this vulnerability. It is not listed on the CISA KEV catalog at the time of this writing. Public proof-of-concept exploits are not widely available, but the vulnerability's nature makes it likely that exploits will emerge.
Organizations using the Redshift JDBC driver in their applications, particularly those that have explicitly configured the preferQueryMode=simple connection property, are at risk. Legacy applications or those with inadequate input validation are especially vulnerable. Shared hosting environments where multiple applications share the same database connection pool could also be affected.
• java / application: Monitor application logs for SQL errors or unusual query patterns. Use static analysis tools to identify vulnerable SQL queries using the preferQueryMode=simple property.
• java / runtime: Use Java profilers to monitor JDBC connection properties and detect the presence of preferQueryMode=simple.
• generic web: If the Redshift JDBC driver is used in a web application, review web application firewall (WAF) rules to block suspicious SQL queries.
• database (postgresql): Examine PostgreSQL audit logs for unusual SQL queries originating from the Redshift JDBC driver.
disclosure
Statut de l'Exploit
EPSS
0.48% (percentile 65%)
CISA SSVC
Vecteur CVSS
The primary mitigation for CVE-2024-32888 is to upgrade to version 2.1.0.28 or later of the Redshift JDBC driver. If immediate upgrading is not possible due to compatibility issues or breaking changes, consider disabling the preferQueryMode=simple connection property. This will revert to the default, extended query mode, which is not vulnerable. Additionally, review application code that interacts with the database to ensure proper parameter validation and sanitization to prevent SQL Injection attacks. Monitor database logs for suspicious SQL queries. After upgrading, confirm the fix by attempting to reproduce the vulnerability using the preferQueryMode=simple property and verifying that the injection is blocked.
Actualice el controlador JDBC de Amazon Redshift a la versión 2.1.0.28 o superior. Como alternativa, evite usar la propiedad de conexión `preferQueryMode=simple`. Si no se especifica un modo de consulta, se utiliza el modo de consulta extendido predeterminado, que no se ve afectado por esta vulnerabilidad.
Analyses de vulnérabilités et alertes critiques directement dans votre boîte mail.
CVE-2024-32888 is a critical SQL Injection vulnerability in the Redshift JDBC driver affecting versions up to 2.1.0.9. It allows attackers to inject malicious SQL code via the preferQueryMode=simple property, potentially compromising data.
You are affected if you are using Redshift JDBC Driver versions 2.1.0.9 or earlier and have enabled the preferQueryMode=simple connection property. Otherwise, you are not directly affected.
Upgrade to version 2.1.0.28 or later of the Redshift JDBC driver. If immediate upgrading is not possible, disable the preferQueryMode=simple property.
There is currently no confirmed evidence of active exploitation, but the vulnerability's severity and nature suggest that exploitation is possible.
Refer to the Amazon Redshift security advisories for the latest information: https://aws.amazon.com/security/security-bulletins/
Téléverse ton fichier de dépendances et découvre instantanément si cette CVE et d'autres te touchent.
Téléverse ton fichier pom.xml et nous te dirons instantanément si tu es affecté.