Vulnerability Details : CVE-2022-30240
An argument injection vulnerability in the browser-based authentication component of the Magnitude Simba Amazon Redshift JDBC Driver 1.2.40 through 1.2.55 may allow a local user to execute code. NOTE: this is different from CVE-2022-29972.
Vulnerability category: Execute code
Products affected by CVE-2022-30240
- Insightsoftware » Magnitude Simba Amazon Redshift Jdbc DriverVersions from including (>=) 1.2.40 and before (<) 1.2.56cpe:2.3:a:insightsoftware:magnitude_simba_amazon_redshift_jdbc_driver:*:*:*:*:*:*:*:*
Exploit prediction scoring system (EPSS) score for CVE-2022-30240
0.24%
Probability of exploitation activity in the next 30 days
EPSS Score History
~ 48 %
Percentile, the proportion of vulnerabilities that are scored at or less
CVSS scores for CVE-2022-30240
Base Score | Base Severity | CVSS Vector | Exploitability Score | Impact Score | Score Source | First Seen |
---|---|---|---|---|---|---|
7.2
|
HIGH | AV:L/AC:L/Au:N/C:C/I:C/A:C |
3.9
|
10.0
|
NIST | |
7.8
|
HIGH | CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H |
1.8
|
5.9
|
NIST |
CWE ids for CVE-2022-30240
-
The product constructs a string for a command to be executed by a separate component in another control sphere, but it does not properly delimit the intended arguments, options, or switches within that command string.Assigned by: nvd@nist.gov (Primary)
References for CVE-2022-30240
-
https://insightsoftware.com/trust/security/advisories/redshift-and-athena-driver-vulnerability/
Magnitude Simba Redshift and Athena Driver Vulnerability - insightsoftwareVendor Advisory
-
https://www.magnitude.com/products/data-connectivity
Data Connectivity | Magnitude Simba Data Connectors - MagnitudeProduct
Jump to