Amazon Redshift vulnerability discovered – patch now
SOPA Image/LightRocket (via Getty Images)
Amazon has confirmed that three high-severity security vulnerabilities that could allow privilege escalation and the full impact this could have on a potential data breach have been identified and fixed. did. Here’s what you need to know about SQL injection issues in a number of Amazon Redshift drivers: CVE-2024-12744, CVE-2024-12745, and CVE-2024-12746
What is Amazon Redshift?
Amazon Redshift, part of the Amazon Web Services cloud computing platform, is a data warehousing solution that handles large dataset and database migrations and can process up to 16 petabytes of data on a single cluster. Amazon says Amazon Redshift enables near real-time analytics without building complex data pipelines, giving you the ability to “analyze petabytes of data without the burden of infrastructure management.” said. When used with SageMaker Lakehouse, Amazon Redshift’s powerful SQL analytics capabilities power tens of thousands of customers. And hackers.
Description of Amazon Redshift SQL Injection Vulnerabilities CVE-2024-12744, CVE-2024-12745, and CVE-2024-12746
Amazon Web Services announced in a December 24 security bulletin that it has identified high-severity issues within the Amazon Redshift Java Database Connectivity Driver, Amazon Redshift Python Connector, and Amazon Redshift Open Database Connectivity Driver. These vulnerabilities are all officially rated 8 and affect Amazon Redshift JDBC driver version 2.1.0.31. Amazon Redshift Python Connector, version 2.1.4; Amazon Redshift ODBC Driver, version v2.1.5.0.
CVE-2024-12744 is a SQL injection issue in the RedShift JDBC driver that could allow an attacker to gain elevated privileges. Amazon says, “We recommend that customers upgrade to driver version 2.1.0.32 or revert to driver version 2.1.0.30.”
CVE-2024-12745 is another SQL injection issue, this time in the Redshift Python Connector, where an SQL command that uses externally influenced input from an upstream component modifies the intended command. It’s a matter of not disabling or disabling potential elements. “This issue is resolved in driver version 2.1.5. We recommend customers upgrade to driver version 2.1.5 or revert to driver version 2.1.3,” Amazon said.
CVE-2024-12746 affects Redshift ODBC Driver v2.1.5.0, allowing privilege escalation via a SQL injection issue when using the SQLTables or SQLColumns metadata APIs. “This issue is resolved in driver version 2.1.6.0. We recommend customers upgrade to driver version 2.1.6.0 or revert to driver version 2.1.4.0,” Amazon said.
Amazon said the fixes were all made available on December 23 and encouraged all customers to upgrade to the latest version to address security vulnerabilities as soon as possible. I asked Amazon for a statement.