You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Summary:
pgAdmin 4 uses a file-based session management approach. The session files are saved on disk as pickle objects. When a user performs a request, the value of the session cookie 'pga4_session' is used to retrieve the file, then its content is deserialised, and finally its signature verified.
The cookie value is split in 2 parts at the first '!' character. The first part is the session ID (sid), while the second is the session digest.
The vulnerability lies in versions of pgAdmin prior to 8.4 where a method loads session files by concatenating the sessions folder - located inside the pgAdmin 4 DATA_DIR - with the session ID. Precisely, the two values are concatenated using the ['os.path.join'] function. It does not set a trusted base-path which should not be escaped
This issue does not affect users running pgAdmin in desktop mode.
The text was updated successfully, but these errors were encountered:
adityatoshniwal
changed the title
Code improvement in file based session
Unsafe Deserialization and Remote Code Execution by an Authenticated user in pgAdmin 4 (CVE-2024-2044)
Mar 7, 2024
I’m using pgadmin4 v 7.3 and installed locally on my laptop to connect GCP (Google cloud platform) instances. Will this CVE-2024-2044 - pgAdmin (<=8.3) Path Traversal in Session Handling Leads to Unsafe Deserialization and Remote Code Execution (RCE) impact me?
I’m using pgadmin4 v 7.3 and installed locally on my laptop to connect GCP (Google cloud platform) instances. Will this CVE-2024-2044 - pgAdmin (<=8.3) Path Traversal in Session Handling Leads to Unsafe Deserialization and Remote Code Execution (RCE) impact me?
It is mentioned in the issue description - This issue does not affect users running pgAdmin in desktop mode.
zeme-wana
pushed a commit
to input-output-hk/nixpkgs
that referenced
this issue
May 8, 2024
Reported by: Davide TheZero thezero@shielder.it along with attachment path_traversal_leads_to_unsafe_deserialization.md for reproducing.
Summary:
pgAdmin 4 uses a file-based session management approach. The session files are saved on disk as pickle objects. When a user performs a request, the value of the session cookie 'pga4_session' is used to retrieve the file, then its content is deserialised, and finally its signature verified.
The cookie value is split in 2 parts at the first '!' character. The first part is the session ID (sid), while the second is the session digest.
The vulnerability lies in versions of pgAdmin prior to 8.4 where a method loads session files by concatenating the sessions folder - located inside the pgAdmin 4 DATA_DIR - with the session ID. Precisely, the two values are concatenated using the ['os.path.join'] function. It does not set a trusted base-path which should not be escaped
This issue does not affect users running pgAdmin in desktop mode.
The text was updated successfully, but these errors were encountered: