Amazon Web Services (AWS) has disclosed multiple high-severity vulnerabilities affecting the Amazon Redshift JDBC Driver, Python Connector, and ODBC Driver components. The identified flaws, tracked as CVE-2024-12744, CVE-2024-12745, and CVE-2024-12746, could allow attackers to perform SQL injection attacks through metadata API functions. AWS has released security updates and advised organizations to immediately upgrade affected drivers to secure versions. The vulnerabilities originate from improper input sanitization within metadata retrieval APIs such as getSchemas, getTables, getColumns, and their equivalent implementations in the Python and ODBC connectors. Attackers capable of interacting with vulnerable applications may inject crafted SQL statements into metadata queries, potentially escalating privileges or manipulating backend database operations. The issue specifically impacts Amazon Redshift JDBC Driver version 2.1.0.31, Python Connector version 2.1.4, and ODBC Driver version 2.1.5. AWS addressed the flaws by releasing patched versions that improve query validation and parameter handling. Security researchers note that exploitation could enable unauthorized access to sensitive metadata, database structure disclosure, or malicious query execution depending on application permissions and deployment architecture. Organizations using Redshift integrations in analytics pipelines, enterprise reporting systems, or cloud-based data warehouses are particularly exposed if applications rely on vulnerable metadata APIs.
A critical security issue in the Marimo Python notebook environment has raised serious alarm in the cybersecurity community due to its ability to enable unauthenticated remote comm...
A sophisticated software supply chain attack targeted the widely used Nx Console extension on the Microsoft Visual Studio Code Marketplace, potentially exposing more than two milli...
Critical security flaws have been discovered in the workflow automation platform n8n, prompting urgent warnings from cybersecurity researchers. The vulnerabilities, tracked as CVE-...