Improperly Secured API in pgAdmin Affects PostgreSQL Path Validation
CVE-2022-4223
8.8HIGH
Summary
The pgAdmin server incorporates an HTTP API designed to validate user-selected paths to PostgreSQL utilities, such as pg_dump and pg_restore. However, versions of pgAdmin prior to 6.17 have inadequately secured this API, allowing unauthenticated users to specify arbitrary paths. This weakness can lead to unexpected execution of executables from a defined path on the server, posing a significant risk to system integrity and data security.
Affected Version(s)
pgadmin4 pgadmin4 6.17
References
CVSS V3.1
Score:
8.8
Severity:
HIGH
Confidentiality:
High
Integrity:
High
Availability:
High
Attack Vector:
Network
Attack Complexity:
Low
Privileges Required:
None
User Interaction:
Required
Scope:
Unchanged
Timeline
Vulnerability published
Vulnerability Reserved