
Cloud Vulnerability DB
An open project to list all known cloud vulnerabilities and Cloud Service Provider security issues
A critical Remote Code Execution (RCE) vulnerability has been identified in pgAdmin versions 8.4 and below, tracked as CVE-2024-3116. The vulnerability exists in the validate binary path API, allowing attackers to execute arbitrary code on servers hosting pgAdmin. This security flaw affects the database management system's integrity and the security of underlying data (NVD, ASEC).
The vulnerability has received a CVSS v3.1 base score of 9.8 (CRITICAL) from NIST with vector string CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H, while PostgreSQL assessed it with a score of 7.4 (HIGH) with vector string CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:L/I:L/A:L. The attack involves creating a malicious binary, disguising it as a standard PostgreSQL utility, and tricking pgAdmin into validating the malicious file's path, leading to its unintended execution (Security Online).
The vulnerability enables attackers to execute malicious code on servers running pgAdmin, potentially compromising the entire database system. On Windows systems, attackers can establish PowerShell reverse shells, granting them remote control of the compromised system with capabilities to execute commands, steal data, and potentially move laterally within a network (Security Online).
Administrators using affected versions of pgAdmin are strongly advised to update immediately to version 8.5 or later. Additional security measures recommended include implementing the principle of least privilege, strict input validation for file paths, network segmentation to isolate database servers, and maintaining robust logging and monitoring systems (Security Online).
Source: This report was generated using AI
Free Vulnerability Assessment
Evaluate your cloud security practices across 9 security domains to benchmark your risk level and identify gaps in your defenses.
An open project to list all known cloud vulnerabilities and Cloud Service Provider security issues
A comprehensive threat intelligence database of cloud security incidents, actors, tools and techniques
A step-by-step framework for modeling and improving SaaS and PaaS tenant isolation
Get a personalized demo
“Best User Experience I have ever seen, provides full visibility to cloud workloads.”
“Wiz provides a single pane of glass to see what is going on in our cloud environments.”
“We know that if Wiz identifies something as critical, it actually is.”