pgAdmin 4 Path Traversal vulnerability
Moderate severity
GitHub Reviewed
Published
Mar 17, 2022
to the GitHub Advisory Database
•
Updated Jun 30, 2023
Description
Published by the National Vulnerability Database
Mar 16, 2022
Published to the GitHub Advisory Database
Mar 17, 2022
Reviewed
Jun 30, 2023
Last updated
Jun 30, 2023
When run in server mode, pgAdmin 4 allows users to store files on the server under individual storage directories. Files such as SQL scripts may be uploaded through the user interface. The URI to which upload requests are made fails to validate the upload path to prevent path traversal techniques being used to store files outside of the storage directory. A malicious, but authorised and authenticated user can construct an HTTP request using their existing CSRF token and session cookie to manually upload files to any location that the operating system user account under which pgAdmin is running has permission to write.
References