SQL Injection via Unchecked DB Name in BSim PostgreSQL Database Drop
SQL Injection via Unchecked DB Name in BSim PostgreSQL Database Drop: PostgresFunctionDatabase concatenates the BSim server's database name directly into a SQL string used to check database existence and then into a DROP DATABASE statement. A server-info object whose getDBName() returns a crafted string (e.g., containing a SQL comment or UNION clause) can lead to injection. The DROP DATABASE path is particularly dangerous because it is destructive and bypasses the BSim table-check guard via an injection that satisfies the guard condition.