dill21yu opened a new issue, #17738:
URL: https://github.com/apache/dolphinscheduler/issues/17738

   ### Search before asking
   
   - [x] I had searched in the 
[issues](https://github.com/apache/dolphinscheduler/issues?q=is%3Aissue) and 
found no similar feature requirement.
   
   
   ### Description
   
   Part of #15940
   **Vulnerability name**: PostgreSQL JDBC SQL injection (CVE-2024-1597)  
   **Category**: SQL injection (driver-level)
   
   ## Description
   CVE-2024-1597 identifies a SQL injection risk in the PostgreSQL JDBC Driver 
when using the non-default connection property `preferQueryMode=simple` 
combined with certain SQL patterns that include negative parameters. Under 
these conditions, parameter binding or parsing may be vulnerable to injection.
   
   ## Recommended fix
   - Upgrade the PostgreSQL JDBC driver to a fixed version (examples: 42.2.28, 
42.3.9, 42.4.4, 42.5.5, 42.6.1, 42.7.2 or later; select the highest compatible 
release).
   - Review connection configurations for `preferQueryMode=simple` and remove 
or avoid it where not necessary.
   - Ensure parameterized queries (`PreparedStatement`) are used and avoid 
concatenating untrusted input into SQL.
   
   ## References
   - PostgreSQL JDBC downloads: https://jdbc.postgresql.org/download.html  
   - CVE: CVE-2024-1597 (link to advisory)  
   - Parent tracking issue: #15940
   
   ### Are you willing to submit a PR?
   
   - [x] Yes I am willing to submit a PR!
   
   ### Code of Conduct
   
   - [x] I agree to follow this project's [Code of 
Conduct](https://www.apache.org/foundation/policies/conduct)
   


-- 
This is an automated message from the Apache Git Service.
To respond to the message, please log on to GitHub and use the
URL above to go to the specific comment.

To unsubscribe, e-mail: 
[email protected]

For queries about this service, please contact Infrastructure at:
[email protected]

Reply via email to