U.S. flag   An official website of the United States government
Dot gov

Official websites use .gov
A .gov website belongs to an official government organization in the United States.

Https

Secure .gov websites use HTTPS
A lock (Dot gov) or https:// means you've safely connected to the .gov website. Share sensitive information only on official, secure websites.

Vulnerability Change Records for CVE-2024-2044

Change History

New CVE Received by NIST 3/07/2024 4:15:08 PM

Action Type Old Value New Value
Added CVSS V3.1

								
							
							
						
PostgreSQL AV:N/AC:H/PR:L/UI:R/S:U/C:L/I:L/A:L
Added Description

								
							
							
						
pgAdmin 4 uses a file-based session management approach. The session files are saved on disk as pickle objects. When a user performs a request, the value of the session cookie 'pga4_session' is used to retrieve the file, then its content is deserialised, and finally its signature verified.
The cookie value is split in 2 parts at the first '!' character. The first part is the session ID (sid), while the second is the session digest.
 The vulnerability lies in versions of pgAdmin prior to 8.4 where a method loads session files by concatenating the sessions folder - located inside the pgAdmin 4 DATA_DIR - with the session ID. Precisely, the two values are concatenated using the ['os.path.join'] function. It does not set a trusted base-path which should not be escaped
Added Reference

								
							
							
						
PostgreSQL https://github.com/pgadmin-org/pgadmin4/issues/7258 [No types assigned]