CVE-2024-2044 Affecting pgadmin4 package, versions <4.30-150300.3.12.1


Severity

Recommended
0.0
high
0
10

Based on SUSE Linux Enterprise Server security rating.

Threat Intelligence

EPSS
0.18% (56th percentile)

Do your applications use this vulnerable package?

In a few clicks we can analyze your entire application and see what components are vulnerable in your application, and suggest you quick fixes.

Test your applications
  • Snyk IDSNYK-SLES154-PGADMIN4-6663794
  • published19 Apr 2024
  • disclosed18 Apr 2024

Introduced: 18 Apr 2024

CVE-2024-2044  (opens in a new tab)

How to fix?

Upgrade SLES:15.4 pgadmin4 to version 4.30-150300.3.12.1 or higher.

NVD Description

Note: Versions mentioned in the description apply only to the upstream pgadmin4 package and not the pgadmin4 package as distributed by SLES. See How to fix? for SLES:15.4 relevant fixed versions and status.

pgAdmin <= 8.3 is affected by a path-traversal vulnerability while deserializing users’ sessions in the session handling code. If the server is running on Windows, an unauthenticated attacker can load and deserialize remote pickle objects and gain code execution. If the server is running on POSIX/Linux, an authenticated attacker can upload pickle objects, deserialize them, and gain code execution.

CVSS Scores

version 3.1