SQL injection in Postgresql JDBC Driver - CVE-2012-1618
Published: May 2, 2022
Postgresql JDBC Driver
PostgreSQL Global Development Group
Description
The vulnerability allows a remote attacker to execute arbitrary SQL queries in database.
The vulnerability exists due to insufficient sanitization of user-supplied data when used with a PostgreSQL server with the "standard_conforming_strings" option enabled, such as the default configuration of PostgreSQL 9.1. A remote attacker can send a specially crafted request to the affected application and execute arbitrary SQL commands within the application database.
Successful exploitation of this vulnerability may allow a remote attacker to read, delete, modify data in database and gain complete control over the affected application.
Remediation
External links
- http://archives.neohapsis.com/archives/bugtraq/2012-03/0126.html
- http://lists.opensuse.org/opensuse-security/2012-03/msg00024.html
- http://www.openwall.com/lists/oss-security/2012/03/30/8
- http://www.openwall.com/lists/oss-security/2012/03/30/9
- http://www.openwall.com/lists/oss-security/2012/03/31/1
- http://www.openwall.com/lists/oss-security/2012/04/02/4
- http://www.openwall.com/lists/oss-security/2012/04/04/11
- http://www.openwall.com/lists/oss-security/2012/04/04/4
- http://www.openwall.com/lists/oss-security/2012/04/04/5
- http://www.openwall.com/lists/oss-security/2012/04/04/9
- http://www.osvdb.org/80641
- https://bugzilla.novell.com/show_bug.cgi?id=754273