A SQL injection in the Amazon Redshift JDBC Driver in v2.1.0.31 allows a user to gain escalated privileges via the getSchemas, getTables, or getColumns Metadata APIs. Users should upgrade to the driver version 2.1.0.32 or revert to driver version 2.1.0.30.
History

Fri, 19 Sep 2025 14:15:00 +0000

Type Values Removed Values Added
First Time appeared Amazon
Amazon amazon Web Services Redshift Java Database Connectivity Driver
CPEs cpe:2.3:a:amazon:amazon_web_services_redshift_java_database_connectivity_driver:2.1.0.31:*:*:*:*:*:*:*
Vendors & Products Amazon
Amazon amazon Web Services Redshift Java Database Connectivity Driver

Thu, 26 Dec 2024 14:30:00 +0000

Type Values Removed Values Added
References

Wed, 25 Dec 2024 03:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'total'}, 'version': '2.0.3'}


Tue, 24 Dec 2024 16:30:00 +0000

Type Values Removed Values Added
Description A SQL injection in the Amazon Redshift JDBC Driver in v2.1.0.31 allows a user to gain escalated privileges via the getSchemas, getTables, or getColumns Metadata APIs. Users should upgrade to the driver version 2.1.0.32 or revert to driver version 2.1.0.30.
Title SQL Injection in the Amazon Redshift JDBC Driver affecting v2.1.0.31
Weaknesses CWE-89
References
Metrics cvssV3_1

{'score': 8, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H'}

cvssV4_0

{'score': 8.6, 'vector': 'CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:P/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N'}


cve-icon MITRE

Status: PUBLISHED

Assigner: AMZN

Published: 2024-12-24T16:12:51.304Z

Updated: 2024-12-26T14:18:13.411Z

Reserved: 2024-12-18T01:02:10.694Z

Link: CVE-2024-12744

cve-icon Vulnrichment

Updated: 2024-12-25T02:38:57.900Z

cve-icon NVD

Status : Analyzed

Published: 2024-12-24T17:15:07.940

Modified: 2025-09-19T14:01:23.133

Link: CVE-2024-12744

cve-icon Redhat

No data.