Miggo Logo

CVE-2024-32888: Amazon JDBC Driver for Redshift SQL Injection via line comment generation

10

CVSS Score
3.1

Basic Information

EPSS Score
0.50066%
Published
5/15/2024
Updated
5/15/2024
KEV Status
No
Technology
TechnologyJava

Technical Details

CVSS Vector
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H
Package NameEcosystemVulnerable VersionsFirst Patched Version
com.amazon.redshift:redshift-jdbc42maven< 2.1.0.282.1.0.28

Vulnerability Intelligence
Miggo AIMiggo AI

Miggo AIRoot Cause Analysis

The vulnerability stems from how parameters are handled in 'simple query mode'. The toString method in SimpleParameterList.java directly inlined parameter values into SQL without sufficient safeguards. The patched commits (bc93694, 12a5e8e) introduced explicit type casting via the quoteAndCast method and expanded type handling, confirming the vulnerability existed in parameter serialization. This matches the PostgreSQL JDBC advisory's root cause where improper parameter inlining led to comment-based SQL injection.

Vulnerable functions

Only Mi**o us*rs **n s** t*is s**tion

WAF Protection Rules

WAF Rule

### Imp**t SQL inj**tion is possi*l* w**n usin* t** non-****ult *onn**tion prop*rty `pr***rQu*ryMo**=simpl*` in *om*in*tion wit* *ppli**tion *o** w*i** **s * vuln*r**l* SQL t**t n***t*s * p*r*m*t*r v*lu*. T**r* is no vuln*r**ility in t** *riv*r w**

Reasoning

T** vuln*r**ility st*ms *rom *ow p*r*m*t*rs *r* **n*l** in 'simpl* qu*ry mo**'. T** toStrin* m*t*o* in Simpl*P*r*m*t*rList.j*v* *ir**tly inlin** p*r*m*t*r v*lu*s into SQL wit*out su**i*i*nt s****u*r*s. T** p*t**** *ommits (*******, *******) intro*u**