redshift_connector is vulnerable to SQL Injection
80
High Risk
Version 2.1.4 of the Amazon Redshift Python Connector is vulnerable to SQL injection. This vulnerability allows attackers to escalate privileges by injecting malicious SQL into the getSchemas, getTables, or getColumns metadata APIs. By manipulating schema input, an attacker can bypass access controls, retrieve unauthorized data, or modify database structures. This poses a significant risk to data integrity and confidentiality. Users are advised to upgrade to version 2.1.5, which contains a fix for this issue. Alternatively, reverting to version 2.1.3 is a temporary mitigation until the latest version can be deployed.
You are affected if you are using version 2.1.4.
redshift_connector is vulnerable to SQL Injection in versions 2.1.4 - 2.1.4.
Upgrade the redshift_connector library to the patch version or downgrade to version 2.1.3.
Secure your code, cloud, and runtime environments in one central system. Find and fix vulnerabilities automatically.
No credit card required | Scan results in 32secs.
SOC 2Compliant
ISO 27001Compliant