logo

CVE-2022-41828 com.amazon.redshift:redshift-jdbc42

Package

Manager: maven
Name: com.amazon.redshift:redshift-jdbc42
Vulnerable Version: >=0 <2.1.0.8

Severity

Level: High

CVSS v3.1: CVSS:3.1/AV:N/AC:H/PR:L/UI:R/S:C/C:H/I:L/A:L

CVSS v4.0: CVSS:4.0/AV:N/AC:H/AT:P/PR:L/UI:N/VC:H/VI:L/VA:L/SC:H/SI:L/SA:L

EPSS: 0.47679 pctl0.97633

Details

com.amazon.redshift:redshift-jdbc42 vulnerable to remote command execution ### Impact A potential remote command execution issue exists within `redshift-jdbc42` versions 2.1.0.7 and below. When plugins are used with the driver, it instantiates plugin instances based on Java class names provided via the `sslhostnameverifier`, `socketFactory`, `sslfactory`, and `sslpasswordcallback` connection properties. In affected versions, the driver does not verify if a plugin class implements the expected interface before instantiatiaton. This can lead to loading of arbitrary Java classes, which a knowledgeable attacker with control over the JDBC URL can use to achieve remote code execution. ### Patches This issue is patched within `redshift-jdbc-42` 2.1.0.8 and above. ### Workarounds We advise customers using plugins to upgrade to `redshift-jdbc42` version 2.1.0.8 or above. There are no known workarounds for this issue. ### For more information If you have any questions or comments about this advisory, please contact AWS Security at [aws-security@amazon.com](mailto:aws-security@amazon.com).

Metadata

Created: 2022-10-12T18:23:36Z
Modified: 2022-10-12T18:23:36Z
Source: https://github.com/github/advisory-database/blob/main/advisories/github-reviewed/2022/10/GHSA-jc69-hjw2-fm86/GHSA-jc69-hjw2-fm86.json
CWE IDs: ["CWE-704"]
Alternative ID: GHSA-jc69-hjw2-fm86
Finding: F113
Auto approve: 1