PostgreSQL Security Flaws Let Attackers Execute Code
- С сайта: Vulnerability(cybersecuritynews.com)
- Вернуться к списку новостей
PostgreSQL Security Flaws Let Attackers Execute Code
Author: Raga VarshiniTwo vulnerabilities have been identified in pgAdmin of PostgreSQL, which are associated with cross-site scripting and multi-factor authentication bypass.
pgAdmin is an open-source administration tool and development platform for PostgreSQL, which offers multiple features like CI/CD, Server Mode, Workspace customization, and much more.
pgAdmin supports multiple platforms, such as Linux, Unix, macOS, and Windows. However, these vulnerabilities have been assigned CVE-2024-4216 and CVE-2024-4215, with severity 7.4 (High).
Both of these vulnerabilities have been fixed in PostgreSQL.
PostgreSQL Security Flaws
CVE-2024-4216 : Cross-Site Scripting Vulnerability
This vulnerability exists in pgAdmin versions prior to 8.5 specifically inside the /settings/store API response json payload.
📁🄳🄾🄲🅄🄼🄴🄽🅃
Exploiting this vulnerability could allow a threat actor to execute malicious script on the client end and steal sensitive cookies.
In order to exploit this vulnerability, researchers used the man-in-the-middle proxy (mitmproxy) and intercepted the POST request to /settings/store which is called for certain purposes like resizing the left menu bar.
The POST request body is modified with “… \”children\”: [{\”id\”:\”+3′-alert(‘XSS’)-‘\”, …” and sent to the server.
The server then responds with this malicious XSS payload which gets executed as a pop-up in the client browser.
![cyber security news](https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhykL6wPW-ctgLQhS36hoDa6QppcQ25PV6jqKHzY0cgfbhyphenhyphenenTmlwS2gyRp46vokc0wfc1m8fqTN2ilbd_IMyOqKvhSUxHEPWheillSkXXCuxjdb92bIsS51MrGQHSunZZMIs4DMBfqTMrTaS3ABzTsg9Qy5I-6AeEdpntD3gf7r1HYbnOd6e1LAL_B9bAG/s16000/Capture%20(33).webp)
CVE-2024-4215 : Multi-Factor Authentication Bypass
This vulnerability affects pgAdmin versions prior to 8.5, which could allow a threat actor to bypass multi-factor authentication on affected versions.
In order to exploit this vulnerability, a threat actor must have a legitimate username and password to authenticate into the application.
Once authenticated into the application, the threat actor can perform additional actions like managing files and executing SQL queries regardless of the MFA enrollment status.
The maintainers have fixed both of these vulnerabilities, and necessary patches have been rolled out.
Users of pgAdmin for PostgreSQL are recommended to upgrade to pgAdmin v4 8.6 to prevent the exploitation of these vulnerabilities by threat actors.
#Cyber_Security #Malware #Vulnerability #pgAdmin #PostgreSQL #Security_Flaws
Оригинальная версия на сайте: