Lucene search

K
githubGitHub Advisory DatabaseGHSA-3V6V-2X6P-32MC
HistoryDec 13, 2022 - 6:30 p.m.

pgadmin4 vulnerable to Code Injection

2022-12-1318:30:34
CWE-94
CWE-862
GitHub Advisory Database
github.com
18
pgadmin4
http api
code injection
postgresql
vulnerability
security issue
unc path
windows server

8.8 High

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

REQUIRED

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H

0.016 Low

EPSS

Percentile

87.4%

The pgAdmin server includes an HTTP API that is intended to be used to validate the path a user selects to external PostgreSQL utilities such as pg_dump and pg_restore. The utility is executed by the server to determine what PostgreSQL version it is from. Versions of pgAdmin prior to 6.17 failed to properly secure this API, which could allow an unauthenticated user to call it with a path of their choosing, such as a UNC path to a server they control on a Windows machine. This would cause an appropriately named executable in the target path to be executed by the pgAdmin server.

Affected configurations

Vulners
Node
pgadmin4Range<6.17
CPENameOperatorVersion
pgadmin4lt6.17

8.8 High

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

REQUIRED

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H

0.016 Low

EPSS

Percentile

87.4%