Ecosyste.ms: Advisories

An open API service providing security vulnerability metadata for many open source software ecosystems.

Security Advisories: GSA_kwCzR0hTQS03andoLTN2cnEtcTNtOM4AA5wG

pgproto3 SQL Injection via Protocol Message Size Overflow

Impact

SQL injection can occur if an attacker can cause a single query or bind message to exceed 4 GB in size. An integer overflow in the calculated message size can cause the one large message to be sent as multiple messages under the attacker's control.

Patches

The problem is resolved in v2.3.3

Workarounds

Reject user input large enough to cause a single query or bind message to exceed 4 GB in size.

Permalink: https://github.com/advisories/GHSA-7jwh-3vrq-q3m8
JSON: https://advisories.ecosyste.ms/api/v1/advisories/GSA_kwCzR0hTQS03andoLTN2cnEtcTNtOM4AA5wG
Source: GitHub Advisory Database
Origin: Unspecified
Severity: High
Classification: General
Published: 9 months ago
Updated: 2 months ago


CVSS Score: 9.8
CVSS vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H

Identifiers: GHSA-7jwh-3vrq-q3m8
References: Repository: https://github.com/jackc/pgproto3
Blast Radius: 41.7

Affected Packages

go:github.com/jackc/pgproto3/v2
Dependent packages: 6,803
Dependent repositories: 18,200
Downloads:
Affected Version Ranges: < 2.3.3
Fixed in: 2.3.3
All affected versions: 2.0.0, 2.0.1, 2.0.2, 2.0.3, 2.0.4, 2.0.5, 2.0.6, 2.0.7, 2.1.0, 2.1.1, 2.2.0, 2.3.0, 2.3.1, 2.3.2
All unaffected versions: 2.3.3
go:github.com/jackc/pgproto3
Dependent packages: 15
Dependent repositories: 17,816
Downloads:
Affected Version Ranges: < 2.3.3
Fixed in: 2.3.3
All affected versions: 1.0.0, 1.1.0
All unaffected versions: