Bugzilla – Bug 1215603
VUL-0: CVE-2023-5002: pgadmin4: remote code execution by an authenticated user
Last modified: 2024-02-09 10:50:02 UTC
CVE-2023-5002 The pgAdmin server includes an HTTP API that is intended to be used to validate the path a user selects to external PostgreSQL utilities such as pg_dump and pg_restore. The utility is executed by the server to determine what PostgreSQL version it is from. Versions of pgAdmin prior to 7.7 failed to properly control the server code executed on this API, which could allow an authenticated user to run arbitrary commands on the server. Users can use the commands as filenames and check for validating the path using the API. This would inject the command in the path validator and execute the command on the pgAdmin server. This issue does not affect users running pgAdmin in desktop mode. Reference: https://github.com/pgadmin-org/pgadmin4/issues/6763 References: http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-5002 https://bugzilla.redhat.com/show_bug.cgi?id=2239164
Affected: - SUSE:SLE-15-SP1:Update/pgadmin4 4.1 - SUSE:SLE-15-SP3:Update/pgadmin4 4.30 - openSUSE:Factory/pgadmin4 7.6
4.1 and 4.30 are too old so they don't even include the affected API functionality. 7.6 seems to be affected but the package in Factory has not worked for a long time. pgAdmin changed the way it was build (now using nodejs) while the package was built just as before which produced a building but not working pgAdmin. This is fixed in https://build.opensuse.org/request/show/1121161 which updates it to 7.8 and rework how pgadmin is built.