First published: Tue Dec 13 2022(Updated: )
The pgAdmin server includes an HTTP API that is intended to be used to validate the path a user selects to external PostgreSQL utilities such as pg_dump and pg_restore. The utility is executed by the server to determine what PostgreSQL version it is from. Versions of pgAdmin prior to 6.17 failed to properly secure this API, which could allow an unauthenticated user to call it with a path of their choosing, such as a UNC path to a server they control on a Windows machine. This would cause an appropriately named executable in the target path to be executed by the pgAdmin server.
Credit: secalert@redhat.com
Affected Software | Affected Version | How to fix |
---|---|---|
Postgresql Pgadmin | <6.17 | |
Fedoraproject Fedora | =37 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The vulnerability ID is CVE-2022-4223.
The title of this vulnerability is 'The pgAdmin server includes an HTTP API that is intended to be used to validate the path a user sele…'
The severity of CVE-2022-4223 is high with a severity value of 8.8.
The affected software is Postgresql Pgadmin (up to version 6.17) and Fedoraproject Fedora (version 37).
To fix CVE-2022-4223, you should update pgAdmin to version 6.17 or higher.