Ecosyste.ms: Advisories
An open API service providing security vulnerability metadata for many open source software ecosystems.
Security Advisories: GSA_kwCzR0hTQS0yN2p4LWZmdzgteHJxds4AA6pB
pgAdmin Remote Code Execution (RCE) vulnerability
pgAdmin <= 8.4 is affected by a Remote Code Execution (RCE) vulnerability through the validate binary path API. This vulnerability allows attackers to execute arbitrary code on the server hosting PGAdmin, posing a severe risk to the database management system's integrity and the security of the underlying data.
Permalink: https://github.com/advisories/GHSA-27jx-ffw8-xrqvJSON: https://advisories.ecosyste.ms/api/v1/advisories/GSA_kwCzR0hTQS0yN2p4LWZmdzgteHJxds4AA6pB
Source: GitHub Advisory Database
Origin: Unspecified
Severity: High
Classification: General
Published: 8 months ago
Updated: 7 months ago
CVSS Score: 7.4
CVSS vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:L/I:L/A:L
Identifiers: GHSA-27jx-ffw8-xrqv, CVE-2024-3116
References:
- https://nvd.nist.gov/vuln/detail/CVE-2024-3116
- https://github.com/pgadmin-org/pgadmin4/issues/7326
- https://gist.github.com/aelmokhtar/689a8be7e3bd535ec01992d8ec7b2b98
- https://github.com/pgadmin-org/pgadmin4/commit/fbbbfe22dd468bcfef1e1f833ec32289a6e56a8b
- https://lists.fedoraproject.org/archives/list/[email protected]/message/GIF5T34JTTYRGIN5YPT366BDFG6452A2
- https://github.com/advisories/GHSA-27jx-ffw8-xrqv
Blast Radius: 12.6
Affected Packages
pypi:pgadmin4
Dependent packages: 1Dependent repositories: 51
Downloads: 10,374 last month
Affected Version Ranges: < 8.5
Fixed in: 8.5
All affected versions:
All unaffected versions: