<?xml version="1.0" encoding="utf-8" standalone="yes"?><rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom" xmlns:content="http://purl.org/rss/1.0/modules/content/"><channel><title>Postgresql — CraftedSignal Threat Feed</title><link>https://feed.craftedsignal.io/tags/postgresql/</link><description>Trending threats, MITRE ATT&amp;CK coverage, and detection metadata — refreshed continuously.</description><generator>Hugo</generator><language>en</language><managingEditor>hello@craftedsignal.io</managingEditor><webMaster>hello@craftedsignal.io</webMaster><lastBuildDate>Thu, 30 Apr 2026 12:00:00 +0000</lastBuildDate><atom:link href="https://feed.craftedsignal.io/tags/postgresql/feed.xml" rel="self" type="application/rss+xml"/><item><title>ABB Ability Symphony Plus Engineering Vulnerabilities Allow Remote Code Execution</title><link>https://feed.craftedsignal.io/briefs/2026-04-abb-symphony-vulns/</link><pubDate>Thu, 30 Apr 2026 12:00:00 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-04-abb-symphony-vulns/</guid><description>Multiple vulnerabilities in ABB Ability Symphony Plus Engineering, stemming from underlying PostgreSQL flaws, could allow a remote attacker with network access to execute arbitrary code and compromise the system.</description><content:encoded><![CDATA[<p>ABB Ability Symphony Plus Engineering versions 2.2 through 2.4 SP2 are susceptible to multiple vulnerabilities originating in the included PostgreSQL database. An attacker gaining access to the S+ Client Server network could exploit CVE-2023-5869 (Integer Overflow), CVE-2023-39417 (SQL Injection), and CVE-2024-7348 (TOCTOU race condition) to execute arbitrary code and potentially compromise the entire ABB system. This poses a significant risk to organizations in critical infrastructure sectors, including Chemical, Critical Manufacturing, Energy, and Water/Wastewater, as these systems are vital for operational control and safety. Successful exploitation could result in loss of control, data breaches, or disruption of essential services. ABB released S+ Engineering 2.4 SP2 RU1 in December 2024 as a fix.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>Attacker gains initial access to the target network, specifically the S+ Client Server network, possibly through existing vulnerabilities or misconfigurations.</li>
<li>Attacker authenticates to the PostgreSQL database server used by ABB Ability Symphony Plus Engineering.</li>
<li>Attacker exploits CVE-2023-5869 by providing crafted data to trigger an integer overflow, enabling arbitrary code execution.</li>
<li>Alternatively, the attacker exploits CVE-2023-39417 by injecting malicious SQL code through extension scripts, leading to arbitrary code execution with administrator privileges.</li>
<li>Alternatively, the attacker exploits CVE-2024-7348, leveraging a TOCTOU race condition to execute arbitrary SQL functions with elevated privileges using a PostgreSQL utility.</li>
<li>The attacker executes arbitrary code within the context of the compromised ABB Ability Symphony Plus Engineering application or the underlying PostgreSQL database.</li>
<li>The attacker leverages the compromised system to move laterally within the OT network, potentially targeting other critical systems or data repositories.</li>
<li>Attacker achieves complete compromise of the ABB Ability Symphony Plus Engineering system, allowing manipulation of industrial processes, data exfiltration, or denial of service.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation of these vulnerabilities in ABB Ability Symphony Plus Engineering can have severe consequences, particularly in critical infrastructure sectors. Affected sectors include chemical, critical manufacturing, energy, and water/wastewater facilities worldwide. A compromised system could allow attackers to manipulate industrial processes, leading to equipment damage, environmental incidents, or disruption of essential services like power generation or water treatment. The vulnerabilities could allow attackers to gain unauthorized access to sensitive data, intellectual property, or control systems, resulting in significant financial losses, reputational damage, and potential safety risks.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Immediately upgrade ABB Ability Symphony Plus Engineering to version 2.4 SP2 RU1 (re-leased in December 2024) or later, as recommended by ABB, to address the identified vulnerabilities (Vendor fix).</li>
<li>Review and enforce network segmentation and firewall configurations to restrict access to the S+ client/server network, mitigating the risk of external attackers exploiting these vulnerabilities (Mitigation).</li>
<li>Monitor network traffic for suspicious activity indicative of PostgreSQL exploitation attempts. Deploy the Sigma rule <code>Detect Suspicious PostgreSQL Utility Execution</code> to identify potential exploitation of CVE-2024-7348.</li>
<li>Enable logging of PostgreSQL queries and analyze logs for SQL injection attempts, specifically looking for suspicious use of extension scripts. Deploy the Sigma rule <code>Detect SQL Injection in PostgreSQL Logs</code> to identify potential exploitation of CVE-2023-39417.</li>
</ul>
]]></content:encoded><category domain="severity">critical</category><category domain="type">advisory</category><category>vulnerability</category><category>ics</category><category>postgresql</category></item><item><title>ElectricSQL /v1/shape API SQL Injection Vulnerability</title><link>https://feed.craftedsignal.io/briefs/2026-04-electric-sql-injection/</link><pubDate>Wed, 22 Apr 2026 12:00:00 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-04-electric-sql-injection/</guid><description>The ElectricSQL sync engine is vulnerable to SQL injection, potentially allowing authenticated users to read, write, and destroy the underlying PostgreSQL database.</description><content:encoded><![CDATA[<p>Electric, a Postgres sync engine, is vulnerable to SQL injection in the <code>order_by</code> parameter of the ElectricSQL <code>/v1/shape</code> API endpoint. This vulnerability exists in versions 1.1.12 to before 1.5.0. Exploitation allows any authenticated user to execute arbitrary SQL queries, leading to potential data breaches, data manipulation, and complete database compromise. Successful exploitation can result in unauthorized access to sensitive information, modification of critical data, and denial of service. Organizations using vulnerable versions of ElectricSQL are at high risk. The vulnerability is resolved in version 1.5.0.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>An attacker authenticates to the ElectricSQL application.</li>
<li>The attacker crafts a malicious HTTP request targeting the <code>/v1/shape</code> API endpoint.</li>
<li>The crafted request includes a SQL injection payload within the <code>order_by</code> parameter.</li>
<li>The ElectricSQL application processes the request without proper sanitization of the <code>order_by</code> parameter.</li>
<li>The malicious SQL payload is executed against the underlying PostgreSQL database.</li>
<li>The attacker leverages the SQL injection vulnerability to extract sensitive data, such as user credentials or proprietary information, using <code>SELECT</code> statements.</li>
<li>The attacker escalates privileges by manipulating database objects or creating new administrative accounts using <code>CREATE</code> and <code>ALTER</code> statements.</li>
<li>The attacker destroys data or renders the database unavailable using <code>DELETE</code> and <code>DROP</code> statements, achieving complete system compromise.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation of this SQL injection vulnerability could lead to a complete compromise of the underlying PostgreSQL database. This may result in unauthorized access to sensitive data, including customer information, financial records, and intellectual property. Attackers could also modify or delete data, leading to data loss, service disruption, and reputational damage. Given the potential for complete data destruction, organizations are urged to remediate this vulnerability immediately.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Upgrade ElectricSQL to version 1.5.0 or later to patch the vulnerability (CVE-2026-40906).</li>
<li>Implement input validation and sanitization for all user-supplied data, especially in the <code>order_by</code> parameter of the <code>/v1/shape</code> API.</li>
<li>Monitor web server logs for suspicious activity, such as unusual characters or SQL keywords in the <code>order_by</code> parameter of requests to the <code>/v1/shape</code> API to enable the &ldquo;Detect Suspicious SQL Injection Attempt in ElectricSQL API Request&rdquo; rule.</li>
<li>Deploy the Sigma rule &ldquo;Detect Suspicious SQL Injection Error Messages&rdquo; to identify potential exploitation attempts based on error responses from the database server.</li>
</ul>
]]></content:encoded><category domain="severity">critical</category><category domain="type">advisory</category><category>sql-injection</category><category>electricsql</category><category>postgresql</category></item><item><title>PostgreSQL JDBC Driver SQL Injection Vulnerability</title><link>https://feed.craftedsignal.io/briefs/2024-06-postgresql-jdbc-injection/</link><pubDate>Tue, 24 Mar 2026 10:21:21 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2024-06-postgresql-jdbc-injection/</guid><description>An anonymous, remote attacker can exploit a vulnerability in the PostgreSQL JDBC Driver to perform SQL injection attacks.</description><content:encoded><![CDATA[<p>A vulnerability exists within the PostgreSQL JDBC Driver that allows for SQL injection attacks. The specifics of the vulnerable versions are not provided, however, exploitation allows a remote, unauthenticated attacker to inject arbitrary SQL commands into the application&rsquo;s database queries. This can lead to data exfiltration, modification, or even complete database compromise. The lack of specific version information makes targeted patching difficult, emphasizing the need for broad detection and prevention strategies. Successful exploitation can have severe consequences for applications relying on the vulnerable JDBC driver, impacting data confidentiality, integrity, and availability.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>The attacker identifies an application using a vulnerable version of the PostgreSQL JDBC driver.</li>
<li>The attacker crafts a malicious SQL injection payload designed to exploit the vulnerability.</li>
<li>The attacker injects the payload through a user-supplied input field, such as a form or API endpoint.</li>
<li>The application, using the vulnerable JDBC driver, constructs an SQL query incorporating the attacker&rsquo;s payload.</li>
<li>The injected SQL code is executed by the PostgreSQL database server.</li>
<li>The attacker gains unauthorized access to sensitive data within the database.</li>
<li>The attacker may modify or delete data, potentially causing application malfunction or data loss.</li>
<li>The attacker could potentially use the SQL injection to execute operating system commands on the database server if the database user has sufficient privileges.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation of this SQL injection vulnerability can lead to complete compromise of the application database. This can result in the exfiltration of sensitive data (credentials, PII, financial records), unauthorized data modification or deletion, and potential disruption of application services. The number of potential victims is vast, as many applications use the PostgreSQL JDBC driver to connect to PostgreSQL databases. The impact ranges from data breaches and financial loss to reputational damage and legal liabilities.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Implement parameterized queries or prepared statements in application code to prevent SQL injection (reference secure coding practices).</li>
<li>Deploy the provided Sigma rules to detect suspicious SQL queries indicative of injection attempts (Sigma rules below).</li>
<li>Monitor web server logs for unusual patterns or error messages related to database interactions (webserver log source).</li>
<li>Regularly update the PostgreSQL JDBC driver to the latest version from a trusted source after vendor confirms fix.</li>
</ul>
]]></content:encoded><category domain="severity">high</category><category domain="type">advisory</category><category>sql-injection</category><category>postgresql</category><category>jdbc</category></item></channel></rss>