Github.Com Jackc Pgx vulnerabilities
2 known vulnerabilities affecting github.com/jackc_pgx.
Total CVEs
2
CISA KEV
0
Public exploits
0
Exploited in wild
0
Severity breakdown
HIGH2
Vulnerabilities
Page 1 of 1
CVE-2024-27304HIGH≥ 0, < 4.18.2≥ 5.0.0, < 5.5.42024-03-04
CVE-2024-27304 [HIGH] CWE-190 pgx SQL Injection via Protocol Message Size Overflow
pgx SQL Injection via Protocol Message Size Overflow
### Impact
SQL injection can occur if an attacker can cause a single query or bind message to exceed 4 GB in size. An integer overflow in the calculated message size can cause the one large message to be sent as multiple messages under the attacker's control.
### Patches
The problem is resolved in v4.18.2 and v5.5.4.
### Workarounds
Reject user input large
ghsaosv
CVE-2024-27289HIGH≥ 0, < 4.18.22024-03-04
CVE-2024-27289 [HIGH] CWE-89 pgx SQL Injection via Line Comment Creation
pgx SQL Injection via Line Comment Creation
### Impact
SQL injection can occur when all of the following conditions are met:
1. The non-default simple protocol is used.
2. A placeholder for a numeric value must be immediately preceded by a minus.
3. There must be a second placeholder for a string value after the first placeholder; both
must be on the same line.
4. Both parameter values must be user-controlled.
e.g.
Sim
ghsaosv