Lucene search

K
cve[email protected]CVE-2022-4223
HistoryDec 13, 2022 - 4:15 p.m.

CVE-2022-4223

2022-12-1316:15:26
CWE-94
CWE-862
web.nvd.nist.gov
62
pgadmin
http api
security vulnerability
cve-2022-4223
unauthenticated user
executable execution

8.8 High

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

REQUIRED

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H

8.5 High

AI Score

Confidence

High

0.016 Low

EPSS

Percentile

87.4%

The pgAdmin server includes an HTTP API that is intended to be used to validate the path a user selects to external PostgreSQL utilities such as pg_dump and pg_restore. The utility is executed by the server to determine what PostgreSQL version it is from. Versions of pgAdmin prior to 6.17 failed to properly secure this API, which could allow an unauthenticated user to call it with a path of their choosing, such as a UNC path to a server they control on a Windows machine. This would cause an appropriately named executable in the target path to be executed by the pgAdmin server.

Affected configurations

Vulners
NVD
Node
pgadmin4Rangeโ‰ค6.17

CNA Affected

[
  {
    "vendor": "n/a",
    "product": "pgadmin4",
    "versions": [
      {
        "version": "pgadmin4 6.17",
        "status": "affected"
      }
    ]
  }
]

8.8 High

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

REQUIRED

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H

8.5 High

AI Score

Confidence

High

0.016 Low

EPSS

Percentile

87.4%