Description
Unsafe use of Python's eval() on server-received data in the vector_in() function in amazon-redshift-python-driver before 2.1.14 allows a rogue server or man-in-the-middle actor to execute arbitrary code on the client. To remediate this issue, users should upgrade to version 2.1.14.
Problem types
CWE-94: Improper Control of Generation of Code ('Code Injection')
Product status
Any version
Credits
Institute of Information Engineering, Chinese Academy of Sciences
References
github.com/...on-redshift-python-driver/releases/tag/v2.1.14
aws.amazon.com/security/security-bulletins/2026-033-aws/
github.com/...driver/security/advisories/GHSA-29h4-r29x-hchv