The vulnerability is described as a SQL injection in /abstract_sql/abstract_sql_store.go. The provided commit 9ac1023362000f6e8e58c9d278653f5926a0d90e modifies this file. The key changes are in the getTxOrDB function and the introduction of the isValidBucket helper function, which now uses s3bucket.VerifyS3BucketName for stricter bucket name validation.
The patch adds an explicit error return in getTxOrDB if isValidBucket(bucket) (which now includes the stricter S3 bucket name verification) returns false. This implies that prior to this change, an invalid bucket name (potentially crafted for SQL injection) could pass this initial check and be used in subsequent database operations, leading to the vulnerability. The function getTxOrDB is responsible for obtaining a database transaction or connection and determining the bucket, making it a critical point for input validation related to bucket names used in SQL queries. The vulnerability lies in the insufficient validation of the bucket parameter within getTxOrDB before it's used in a context where SQL injection is possible.