pgAdmin <= 8.4 is affected by a Remote Code Execution (RCE) vulnerability through the validate binary path API. This vulnerability allows attackers to execute arbitrary code on the server hosting PGAdmin, posing a severe risk to the database management system's integrity and the security of the underlying data.
References
| Link | Resource |
|---|---|
| https://gist.github.com/aelmokhtar/689a8be7e3bd535ec01992d8ec7b2b98 | Exploit Third Party Advisory |
| https://github.com/pgadmin-org/pgadmin4/issues/7326 | Exploit Issue Tracking |
| https://lists.fedoraproject.org/archives/list/[email protected]/message/GIF5T34JTTYRGIN5YPT366BDFG6452A2/ | Mailing List |
| https://gist.github.com/aelmokhtar/689a8be7e3bd535ec01992d8ec7b2b98 | Exploit Third Party Advisory |
| https://github.com/pgadmin-org/pgadmin4/issues/7326 | Exploit Issue Tracking |
| https://lists.fedoraproject.org/archives/list/[email protected]/message/GIF5T34JTTYRGIN5YPT366BDFG6452A2/ | Mailing List |
| https://www.vicarius.io/vsociety/posts/remote-code-execution-vulnerability-in-pgadmin-cve-2024-3116 | Exploit Third Party Advisory |
Configurations
History
No history.
Information
Published : 2024-04-04 15:15
Updated : 2025-03-17 16:43
NVD link : CVE-2024-3116
Mitre link : CVE-2024-3116
CVE.ORG link : CVE-2024-3116
JSON object : View
Products Affected
fedoraproject
- fedora
pgadmin
- pgadmin_4
CWE
NVD-CWE-noinfo
CWE-77
Improper Neutralization of Special Elements used in a Command ('Command Injection')
