
Cloud Vulnerability DB
A community-led vulnerabilities database
A vulnerability classified as problematic was found in Python 2.7.13, specifically affecting the pgAdmin4 component. The vulnerability was discovered in February 2017 and involves an insecure library loading mechanism that could allow code execution. The issue affects systems running Python 2.7.13 with pgAdmin4 installed (Exploit List, NVD).
The vulnerability stems from uncontrolled search path elements in the component pgAdmin4. When looking for specific DLLs, particularly uuid.dll, the application searches various locations including directories listed in the PATH variable. Since these DLLs are missing from the default application install directory, the search behavior can be exploited. The vulnerability has been assigned a CVSS v3.1 Base Score of 7.8 (HIGH) with the vector string CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H (NVD).
Successful exploitation of this vulnerability could lead to disclosure of sensitive information, addition or modification of data, or Denial of Service (DoS). The attack can be initiated remotely, and when successfully exploited, allows attackers to execute arbitrary code in the context of the privileged Admin user (NetApp Advisory).
According to the pgAdmin4 team, the search for the uuid.dll library is initiated entirely by the Python interpreter, not by any of their code, making this a Python bug rather than a pgAdmin issue. No specific patches or workarounds have been officially documented (Exploit List).
Source: This report was generated using AI
Free Vulnerability Assessment
Evaluate your cloud security practices across 9 security domains to benchmark your risk level and identify gaps in your defenses.
Get a personalized demo
"Best User Experience I have ever seen, provides full visibility to cloud workloads."
"Wiz provides a single pane of glass to see what is going on in our cloud environments."
"We know that if Wiz identifies something as critical, it actually is."