A SQL injection in the Amazon Redshift Python Connector v2.1.4 allows a user to gain escalated privileges via the get_schemas, get_tables, or get_columns Metadata APIs. Users are recommended to upgrade to the driver version 2.1.5 or revert to driver version 2.1.3.
References
| Link | Resource |
|---|---|
| https://aws.amazon.com/security/security-bulletins/AWS-2024-015/ | Vendor Advisory |
| https://github.com/aws/amazon-redshift-python-driver/releases/tag/v2.1.5 | Release Notes |
| https://github.com/aws/amazon-redshift-python-driver/security/advisories/GHSA-8gc2-vq6m-rwjw | Mitigation Vendor Advisory |
Configurations
History
No history.
Information
Published : 2024-12-24 17:15
Updated : 2025-12-11 18:32
NVD link : CVE-2024-12745
Mitre link : CVE-2024-12745
CVE.ORG link : CVE-2024-12745
JSON object : View
Products Affected
amazon
- redshift_connector
CWE
CWE-89
Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')
