Lucene search

K
githubGitHub Advisory DatabaseGHSA-27JX-FFW8-XRQV
HistoryApr 04, 2024 - 3:30 p.m.

pgAdmin Remote Code Execution (RCE) vulnerability

2024-04-0415:30:34
GitHub Advisory Database
github.com
26
pgadmin
remote code execution
vulnerability
validate binary path api
attackers
arbitrary code
server hosting
database management system
security
data

CVSS3

7.4

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

LOW

User Interaction

NONE

Scope

CHANGED

Confidentiality Impact

LOW

Integrity Impact

LOW

Availability Impact

LOW

CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:L/I:L/A:L

AI Score

8.4

Confidence

High

EPSS

0.003

Percentile

65.8%

pgAdmin <= 8.4 is affected by a Remote Code Execution (RCE) vulnerability through the validate binary path API. This vulnerability allows attackers to execute arbitrary code on the server hosting PGAdmin, posing a severe risk to the database management system’s integrity and the security of the underlying data.

Affected configurations

Vulners
Node
pgadmin4Range<8.5
VendorProductVersionCPE
*pgadmin4*cpe:2.3:a:*:pgadmin4:*:*:*:*:*:*:*:*

CVSS3

7.4

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

LOW

User Interaction

NONE

Scope

CHANGED

Confidentiality Impact

LOW

Integrity Impact

LOW

Availability Impact

LOW

CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:L/I:L/A:L

AI Score

8.4

Confidence

High

EPSS

0.003

Percentile

65.8%