-
Notifications
You must be signed in to change notification settings - Fork 14.1k
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
pgAdmin 8.4 RCE / CVE-2024-3116 #19422
Conversation
@igomeow Just for visibility - we've got a release planned for tomorrow morning, if the PR feedback is applied today then we'd be able to get this landed and shipped in time I think! 🤞 |
@adfoster-r7 I've processed all feedbacks, hope I have completed it on time. |
testing against 7.4:
Looks good to me, thanks! Will land once CI is finished |
Release NotesAdds a new module targeting all versions of PgAdmin up to 8.4 which leverages a Remote Code Execution (RCE) CVE-2024-3116 flaw through the validate binary path API. |
Hi, i have a question about unauthenticated method. When i trying to exploit the module, msfconsole returns the error:
I see that you used 2 diffent virtual machines for each scenarios. What difference between pgAdmin configurations on these machines? |
Thanks for catching typo in documentation! I will fix it. One server requires username/password, other one doesn't require, to access pgadmin console. In your case, it seems pgadmin requires username/password. So you should provide valid credentials. If pgAdmin doesn't require any creds, please let me know which version it is. I will try to debug the problem. |
pgAdmin versions up to 8.4 are vulnerable to a Remote Code Execution (RCE) (CVE-2024-3116) flaw through the validate binary path API.
This vulnerability allows attackers to run arbitrary code on the server hosting pgAdmin, which poses a significant
threat to the integrity of the database management system and the security of its underlying data.
The exploit can be executed in both authenticated and unauthenticated scenarios. When valid credentials are available,
Metasploit can log in to pgAdmin, upload a malicious payload using the file management plugin, and then execute it via
the validate_binary_path endpoint. This vulnerability is specific to Windows targets. If authentication is not required
by the application, Metasploit can directly upload and trigger the payload through the validate_binary_path endpoint.
Verification
pgAdmin 8.4 on Windows (Authenticated)
pgAdmin 8.4 on Windows (Unauthenticated)