A flaw was found in pgAdmin. This issue occurs when the pgAdmin server HTTP API validates the path a user selects to external PostgreSQL utilities such as pg_dump and pg_restore. Versions of pgAdmin prior to 7.6 failed to properly control the server code executed on this API, allowing an authenticated user to run arbitrary commands on the server.
References
Link | Resource |
---|---|
https://bugzilla.redhat.com/show_bug.cgi?id=2239164 | Issue Tracking Third Party Advisory |
https://github.com/pgadmin-org/pgadmin4/issues/6763 | Issue Tracking Patch |
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/2S24D3S2GVNGTDNE6SF2OQSOPU3H72UW/ | Mailing List |
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/VIRTMQZEE6K7RD37ERZ2UFYFLEUXLQU3/ | Mailing List |
History
No history.
MITRE Information
Status: PUBLISHED
Assigner: fedora
Published: 2023-09-22T13:31:43.124Z
Updated: 2024-06-04T17:28:36.879Z
Reserved: 2023-09-15T16:22:28.547Z
Link: CVE-2023-5002
JSON object: View
NVD Information
Status : Modified
Published: 2023-09-22T14:15:47.213
Modified: 2023-11-07T04:23:17.827
Link: CVE-2023-5002
JSON object: View
Redhat Information
No data.
CWE