dill21yu opened a new issue, #17738: URL: https://github.com/apache/dolphinscheduler/issues/17738
### Search before asking - [x] I had searched in the [issues](https://github.com/apache/dolphinscheduler/issues?q=is%3Aissue) and found no similar feature requirement. ### Description Part of #15940 **Vulnerability name**: PostgreSQL JDBC SQL injection (CVE-2024-1597) **Category**: SQL injection (driver-level) ## Description CVE-2024-1597 identifies a SQL injection risk in the PostgreSQL JDBC Driver when using the non-default connection property `preferQueryMode=simple` combined with certain SQL patterns that include negative parameters. Under these conditions, parameter binding or parsing may be vulnerable to injection. ## Recommended fix - Upgrade the PostgreSQL JDBC driver to a fixed version (examples: 42.2.28, 42.3.9, 42.4.4, 42.5.5, 42.6.1, 42.7.2 or later; select the highest compatible release). - Review connection configurations for `preferQueryMode=simple` and remove or avoid it where not necessary. - Ensure parameterized queries (`PreparedStatement`) are used and avoid concatenating untrusted input into SQL. ## References - PostgreSQL JDBC downloads: https://jdbc.postgresql.org/download.html - CVE: CVE-2024-1597 (link to advisory) - Parent tracking issue: #15940 ### Are you willing to submit a PR? - [x] Yes I am willing to submit a PR! ### Code of Conduct - [x] I agree to follow this project's [Code of Conduct](https://www.apache.org/foundation/policies/conduct) -- This is an automated message from the Apache Git Service. To respond to the message, please log on to GitHub and use the URL above to go to the specific comment. To unsubscribe, e-mail: [email protected] For queries about this service, please contact Infrastructure at: [email protected]
