CVE-2024-2044Path Traversal: 'dir\..\..\filename' in Pgadmin 4

Severity
9.9CRITICALNVD
EPSS
83.5%
top 0.72%
CISA KEV
Not in KEV
Exploit
No known exploits
Timeline
PublishedMar 7

Description

pgAdmin <= 8.3 is affected by a path-traversal vulnerability while deserializing users’ sessions in the session handling code. If the server is running on Windows, an unauthenticated attacker can load and deserialize remote pickle objects and gain code execution. If the server is running on POSIX/Linux, an authenticated attacker can upload pickle objects, deserialize them, and gain code execution.

CVSS vector

CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:HExploitability: 3.1 | Impact: 6.0

Affected Packages2 packages

CVEListV5pgadmin.org/pgadmin_4< 8.4

Also affects: Fedora 40

🔴Vulnerability Details

3
CVEList
Unsafe Deserialisation and Remote Code Execution by an Authenticated user in pgAdmin 42024-03-07
GHSA
pgAdmin 4 vulnerable to Unsafe Deserialization and Remote Code Execution by an Authenticated user2024-03-07
OSV
pgAdmin 4 vulnerable to Unsafe Deserialization and Remote Code Execution by an Authenticated user2024-03-07
CVE-2024-2044 — Path Traversal: 'dir\..\..\filename' | cvebase