Alta Aware — 1588: SQL injection vulnerabilities in the jackc/pgx and jackc/pgproto3 Go packages

Release Date

31st of July 2024.

Overview

The Go packages github.com/jackc/pgx/v4 and github.com/jackc/pgproto3/v2 are vulnerable to SQL injection. CVE-2024-27304 allows attackers to exploit an integer overflow by sending a large query or bind message exceeding 4 GB, causing the message to be split into multiple messages under the attacker's control. Additionally, CVE-2024-27289 allows attackers to inject SQL code when using the non-default simple protocol in specific scenarios involving parameterized queries with user-controlled values.

Affected Products

  • Ava Aware:
    • All Stable upgrade channel versions before 6.8.6.
    • All Beta upgrade channel versions before 6.8.0.

Unaffected Products

  • Ava Aware:

    • All Stable upgrade channel versions after and including 6.8.6.
    • All Beta upgrade channel versions after and including 6.8.0.
  • Ava Cameras: all versions.

  • Ava Cloud: all versions.

Resolution

This issue has been fixed in Ava Aware Beta upgrade channel version 6.8.0 and Stable upgrade channel version 6.8.6.

It is crucial that all installations running an affected version are upgraded to the latest release as soon as possible. Releases are available to download through the Ava Aware User Interface.

Vulnerability Information

Mitigations

There are no known mitigations for this issue.

Work arounds

There are no known work arounds for this issue.

Acknowledgements

Issue reported by Paul Gerste.

Disclosure Timeline

  • 20/03/2024 Issue found
  • 20/03/2024 Root cause established
  • 26/03/2024 Fix identified
  • 04/04/2024 Patched Ava Aware (Beta upgrade channel) released
  • 07/05/2024 Patched Ava Aware (Stable upgrade channel) released
  • 31/07/2024 Vulnerability publicly disclosed