CVE-2024-44905

go-pg pg v10.13.0 was discovered to contain a SQL injection vulnerability via the component /types/append_value.go.
Configurations

Configuration 1 (hide)

cpe:2.3:a:uptrace:pg:10.13.0:*:*:*:*:go:*:*

History

09 Jul 2025, 19:14

Type Values Removed Values Added
References () https://github.com/go-pg/pg - () https://github.com/go-pg/pg - Product
References () https://github.com/go-pg/pg/blob/30e7053c6cacdd44d06cf2b92183b49188b7c922/types/append_value.go#L151 - () https://github.com/go-pg/pg/blob/30e7053c6cacdd44d06cf2b92183b49188b7c922/types/append_value.go#L151 - Product
References () https://media.defcon.org/DEF%20CON%2032/DEF%20CON%2032%20presentations/DEF%20CON%2032%20-%20Paul%20Gerste%20-%20SQL%20Injection%20Isn%27t%20Dead%20Smuggling%20Queries%20at%20the%20Protocol%20Level.pdf - () https://media.defcon.org/DEF%20CON%2032/DEF%20CON%2032%20presentations/DEF%20CON%2032%20-%20Paul%20Gerste%20-%20SQL%20Injection%20Isn%27t%20Dead%20Smuggling%20Queries%20at%20the%20Protocol%20Level.pdf - Exploit
References () https://www.sonarsource.com/blog/double-dash-double-trouble-a-subtle-sql-injection-flaw/ - () https://www.sonarsource.com/blog/double-dash-double-trouble-a-subtle-sql-injection-flaw/ - Exploit, Third Party Advisory
CPE cpe:2.3:a:uptrace:pg:10.13.0:*:*:*:*:go:*:*
First Time Uptrace pg
Uptrace

17 Jun 2025, 20:15

Type Values Removed Values Added
CWE CWE-89
CVSS v2 : unknown
v3 : unknown
v2 : unknown
v3 : 6.5

16 Jun 2025, 12:32

Type Values Removed Values Added
Summary
  • (es) Se descubrió que go-pg pg v10.13.0 contenía una vulnerabilidad de inyección SQL a través del componente /types/append_value.go.

12 Jun 2025, 16:15

Type Values Removed Values Added
New CVE

Information

Published : 2025-06-12 16:15

Updated : 2025-07-09 19:14


NVD link : CVE-2024-44905

Mitre link : CVE-2024-44905

CVE.ORG link : CVE-2024-44905


JSON object : View

Products Affected

uptrace

  • pg
CWE
CWE-89

Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')