Lucene search

K
githubGitHub Advisory DatabaseGHSA-RJ98-CRF4-G69W
HistoryMar 07, 2024 - 9:30 p.m.

pgAdmin 4 vulnerable to Unsafe Deserialization and Remote Code Execution by an Authenticated user

2024-03-0721:30:22
CWE-22
CWE-31
CWE-502
GitHub Advisory Database
github.com
17
pgadmin 4
vulnerability
unsafe deserialization
remote code execution
authenticated user
windows
posix/linux
pickle objects
session handling code
path-traversal

CVSS3

9.9

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

LOW

User Interaction

NONE

Scope

CHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H

AI Score

5.2

Confidence

High

EPSS

0.002

Percentile

53.0%

pgAdmin prior to version 8.4 is affected by a path-traversal vulnerability while deserializing users’ sessions in the session handling code. If the server is running on Windows, an unauthenticated attacker can load and deserialize remote pickle objects and gain code execution. If the server is running on POSIX/Linux, an authenticated attacker can upload pickle objects, deserialize them and gain code execution.

Affected configurations

Vulners
Node
pgadmin4Range<8.4
VendorProductVersionCPE
*pgadmin4*cpe:2.3:a:*:pgadmin4:*:*:*:*:*:*:*:*

CVSS3

9.9

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

LOW

User Interaction

NONE

Scope

CHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H

AI Score

5.2

Confidence

High

EPSS

0.002

Percentile

53.0%