Action not permitted
Modal body text goes here.
Modal Title
Modal Body
CVE-2024-9014 (GCVE-0-2024-9014)
Vulnerability from cvelistv5
Published
2024-09-23 17:04
Modified
2024-09-23 19:21
Severity ?
VLAI Severity ?
EPSS score ?
Summary
pgAdmin versions 8.11 and earlier are vulnerable to a security flaw in OAuth2 authentication. This vulnerability allows an attacker to potentially obtain the client ID and secret, leading to unauthorized access to user data.
References
Impacted products
Vendor | Product | Version | ||
---|---|---|---|---|
pgadmin.org | pgAdmin 4 |
Version: 0 < 8.12 |
{ "containers": { "adp": [ { "affected": [ { "cpes": [ "cpe:2.3:a:postgresql:pgadmin_4:*:*:*:*:*:*:*:*" ], "defaultStatus": "affected", "product": "pgadmin_4", "vendor": "postgresql", "versions": [ { "lessThan": "8.12", "status": "affected", "version": "0", "versionType": "custom" } ] } ], "metrics": [ { "other": { "content": { "id": "CVE-2024-9014", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "total" } ], "role": "CISA Coordinator", "timestamp": "2024-09-23T19:13:55.230423Z", "version": "2.0.3" }, "type": "ssvc" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-522", "description": "CWE-522 Insufficiently Protected Credentials", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2024-09-23T19:21:22.348Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "defaultStatus": "affected", "modules": [ "User Authentication" ], "product": "pgAdmin 4", "programFiles": [ "https://github.com/pgadmin-org/pgadmin4/blob/master/web/pgadmin/templates/security/login_user.html" ], "repo": "https://github.com/pgadmin-org/pgadmin4", "vendor": "pgadmin.org", "versions": [ { "lessThan": "8.12", "status": "affected", "version": "0", "versionType": "custom" } ] } ], "descriptions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "pgAdmin versions 8.11 and earlier are vulnerable to a security flaw in OAuth2 authentication. This vulnerability allows an attacker to potentially obtain the client ID and secret, leading to unauthorized access to user data.\u003cbr\u003e\u003cbr\u003e\u003cbr\u003e" } ], "value": "pgAdmin versions 8.11 and earlier are vulnerable to a security flaw in OAuth2 authentication. This vulnerability allows an attacker to potentially obtain the client ID and secret, leading to unauthorized access to user data." } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 9.9, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "CHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H", "version": "3.1" }, "format": "CVSS", "scenarios": [ { "lang": "en", "value": "GENERAL" } ] } ], "providerMetadata": { "dateUpdated": "2024-09-23T17:04:00.264Z", "orgId": "f86ef6dc-4d3a-42ad-8f28-e6d5547a5007", "shortName": "PostgreSQL" }, "references": [ { "tags": [ "issue-tracking" ], "url": "https://github.com/pgadmin-org/pgadmin4/issues/7945" } ], "source": { "discovery": "EXTERNAL" }, "title": "OAuth2 client id and secret exposed through the web browser in pgAdmin 4", "x_generator": { "engine": "Vulnogram 0.1.0-dev" } } }, "cveMetadata": { "assignerOrgId": "f86ef6dc-4d3a-42ad-8f28-e6d5547a5007", "assignerShortName": "PostgreSQL", "cveId": "CVE-2024-9014", "datePublished": "2024-09-23T17:04:00.264Z", "dateReserved": "2024-09-19T18:00:05.741Z", "dateUpdated": "2024-09-23T19:21:22.348Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1", "vulnerability-lookup:meta": { "nvd": "{\"cve\":{\"id\":\"CVE-2024-9014\",\"sourceIdentifier\":\"f86ef6dc-4d3a-42ad-8f28-e6d5547a5007\",\"published\":\"2024-09-23T17:15:14.000\",\"lastModified\":\"2024-09-26T13:32:55.343\",\"vulnStatus\":\"Awaiting Analysis\",\"cveTags\":[],\"descriptions\":[{\"lang\":\"en\",\"value\":\"pgAdmin versions 8.11 and earlier are vulnerable to a security flaw in OAuth2 authentication. This vulnerability allows an attacker to potentially obtain the client ID and secret, leading to unauthorized access to user data.\"},{\"lang\":\"es\",\"value\":\"Las versiones 8.11 y anteriores de pgAdmin son vulnerables a una falla de seguridad en la autenticaci\u00f3n OAuth2. Esta vulnerabilidad permite que un atacante obtenga potencialmente el ID y el secreto del cliente, lo que lleva a un acceso no autorizado a los datos del usuario.\"}],\"metrics\":{\"cvssMetricV31\":[{\"source\":\"f86ef6dc-4d3a-42ad-8f28-e6d5547a5007\",\"type\":\"Secondary\",\"cvssData\":{\"version\":\"3.1\",\"vectorString\":\"CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H\",\"baseScore\":9.9,\"baseSeverity\":\"CRITICAL\",\"attackVector\":\"NETWORK\",\"attackComplexity\":\"LOW\",\"privilegesRequired\":\"LOW\",\"userInteraction\":\"NONE\",\"scope\":\"CHANGED\",\"confidentialityImpact\":\"HIGH\",\"integrityImpact\":\"HIGH\",\"availabilityImpact\":\"HIGH\"},\"exploitabilityScore\":3.1,\"impactScore\":6.0}]},\"weaknesses\":[{\"source\":\"134c704f-9b21-4f2e-91b3-4a467353bcc0\",\"type\":\"Secondary\",\"description\":[{\"lang\":\"en\",\"value\":\"CWE-522\"}]}],\"references\":[{\"url\":\"https://github.com/pgadmin-org/pgadmin4/issues/7945\",\"source\":\"f86ef6dc-4d3a-42ad-8f28-e6d5547a5007\"}]}}", "vulnrichment": { "containers": "{\"adp\": [{\"title\": \"CISA ADP Vulnrichment\", \"metrics\": [{\"other\": {\"type\": \"ssvc\", \"content\": {\"id\": \"CVE-2024-9014\", \"role\": \"CISA Coordinator\", \"options\": [{\"Exploitation\": \"none\"}, {\"Automatable\": \"no\"}, {\"Technical Impact\": \"total\"}], \"version\": \"2.0.3\", \"timestamp\": \"2024-09-23T19:13:55.230423Z\"}}}], \"affected\": [{\"cpes\": [\"cpe:2.3:a:postgresql:pgadmin_4:*:*:*:*:*:*:*:*\"], \"vendor\": \"postgresql\", \"product\": \"pgadmin_4\", \"versions\": [{\"status\": \"affected\", \"version\": \"0\", \"lessThan\": \"8.12\", \"versionType\": \"custom\"}], \"defaultStatus\": \"affected\"}], \"problemTypes\": [{\"descriptions\": [{\"lang\": \"en\", \"type\": \"CWE\", \"cweId\": \"CWE-522\", \"description\": \"CWE-522 Insufficiently Protected Credentials\"}]}], \"providerMetadata\": {\"orgId\": \"134c704f-9b21-4f2e-91b3-4a467353bcc0\", \"shortName\": \"CISA-ADP\", \"dateUpdated\": \"2024-09-23T19:21:17.669Z\"}}], \"cna\": {\"title\": \"OAuth2 client id and secret exposed through the web browser in pgAdmin 4\", \"source\": {\"discovery\": \"EXTERNAL\"}, \"metrics\": [{\"format\": \"CVSS\", \"cvssV3_1\": {\"scope\": \"CHANGED\", \"version\": \"3.1\", \"baseScore\": 9.9, \"attackVector\": \"NETWORK\", \"baseSeverity\": \"CRITICAL\", \"vectorString\": \"CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H\", \"integrityImpact\": \"HIGH\", \"userInteraction\": \"NONE\", \"attackComplexity\": \"LOW\", \"availabilityImpact\": \"HIGH\", \"privilegesRequired\": \"LOW\", \"confidentialityImpact\": \"HIGH\"}, \"scenarios\": [{\"lang\": \"en\", \"value\": \"GENERAL\"}]}], \"affected\": [{\"repo\": \"https://github.com/pgadmin-org/pgadmin4\", \"vendor\": \"pgadmin.org\", \"modules\": [\"User Authentication\"], \"product\": \"pgAdmin 4\", \"versions\": [{\"status\": \"affected\", \"version\": \"0\", \"lessThan\": \"8.12\", \"versionType\": \"custom\"}], \"programFiles\": [\"https://github.com/pgadmin-org/pgadmin4/blob/master/web/pgadmin/templates/security/login_user.html\"], \"defaultStatus\": \"affected\"}], \"references\": [{\"url\": \"https://github.com/pgadmin-org/pgadmin4/issues/7945\", \"tags\": [\"issue-tracking\"]}], \"x_generator\": {\"engine\": \"Vulnogram 0.1.0-dev\"}, \"descriptions\": [{\"lang\": \"en\", \"value\": \"pgAdmin versions 8.11 and earlier are vulnerable to a security flaw in OAuth2 authentication. This vulnerability allows an attacker to potentially obtain the client ID and secret, leading to unauthorized access to user data.\", \"supportingMedia\": [{\"type\": \"text/html\", \"value\": \"pgAdmin versions 8.11 and earlier are vulnerable to a security flaw in OAuth2 authentication. This vulnerability allows an attacker to potentially obtain the client ID and secret, leading to unauthorized access to user data.\u003cbr\u003e\u003cbr\u003e\u003cbr\u003e\", \"base64\": false}]}], \"providerMetadata\": {\"orgId\": \"f86ef6dc-4d3a-42ad-8f28-e6d5547a5007\", \"shortName\": \"PostgreSQL\", \"dateUpdated\": \"2024-09-23T17:04:00.264Z\"}}}", "cveMetadata": "{\"cveId\": \"CVE-2024-9014\", \"state\": \"PUBLISHED\", \"dateUpdated\": \"2024-09-23T19:21:22.348Z\", \"dateReserved\": \"2024-09-19T18:00:05.741Z\", \"assignerOrgId\": \"f86ef6dc-4d3a-42ad-8f28-e6d5547a5007\", \"datePublished\": \"2024-09-23T17:04:00.264Z\", \"assignerShortName\": \"PostgreSQL\"}", "dataType": "CVE_RECORD", "dataVersion": "5.1" } } }
suse-su-2024:3771-1
Vulnerability from csaf_suse
Published
2024-10-29 12:55
Modified
2024-10-29 12:55
Summary
Security update for pgadmin4
Notes
Title of the patch
Security update for pgadmin4
Description of the patch
This update for pgadmin4 fixes the following issues:
- CVE-2024-38355: Fixed socket.io: unhandled 'error' event (bsc#1226967)
- CVE-2024-38998: Fixed requirejs: prototype pollution via function config (bsc#1227248)
- CVE-2024-38999: Fixed requirejs: prototype pollution via function s.contexts._.configure (bsc#1227252)
- CVE-2024-39338: Fixed axios: server-side request forgery due to requests for path relative URLs being processed as protocol relative URLs in axios (bsc#1229423)
- CVE-2024-4067: Fixed micromatch: vulnerable to Regular Expression Denial of Service (ReDoS) (bsc#1224366)
- CVE-2024-4068: Fixed braces: fails to limit the number of characters it can handle, which could lead to Memory Exhaustion (bsc#1224295)
- CVE-2024-43788: Fixed webpack: DOM clobbering gadget in AutoPublicPathRuntimeModule could lead to XSS (bsc#1229861)
- CVE-2024-48948: Fixed elliptic: ECDSA signature verification error due to leading zero may reject legitimate transactions in elliptic (bsc#1231684)
- CVE-2024-48949: Fixed elliptic: Missing Validation in Elliptic's EDDSA Signature Verification (bsc#1231564)
- CVE-2024-9014: Fixed OAuth2 issue that could lead to information leak (bsc#1230928)
Patchnames
SUSE-2024-3771,SUSE-SLE-Module-Python3-15-SP6-2024-3771,openSUSE-SLE-15.6-2024-3771
Terms of use
CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).
{ "document": { "aggregate_severity": { "namespace": "https://www.suse.com/support/security/rating/", "text": "important" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright 2024 SUSE LLC. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "Security update for pgadmin4", "title": "Title of the patch" }, { "category": "description", "text": "This update for pgadmin4 fixes the following issues:\n\n- CVE-2024-38355: Fixed socket.io: unhandled \u0027error\u0027 event (bsc#1226967)\n- CVE-2024-38998: Fixed requirejs: prototype pollution via function config (bsc#1227248)\n- CVE-2024-38999: Fixed requirejs: prototype pollution via function s.contexts._.configure (bsc#1227252)\n- CVE-2024-39338: Fixed axios: server-side request forgery due to requests for path relative URLs being processed as protocol relative URLs in axios (bsc#1229423)\n- CVE-2024-4067: Fixed micromatch: vulnerable to Regular Expression Denial of Service (ReDoS) (bsc#1224366)\n- CVE-2024-4068: Fixed braces: fails to limit the number of characters it can handle, which could lead to Memory Exhaustion (bsc#1224295)\n- CVE-2024-43788: Fixed webpack: DOM clobbering gadget in AutoPublicPathRuntimeModule could lead to XSS (bsc#1229861)\n- CVE-2024-48948: Fixed elliptic: ECDSA signature verification error due to leading zero may reject legitimate transactions in elliptic (bsc#1231684)\n- CVE-2024-48949: Fixed elliptic: Missing Validation in Elliptic\u0027s EDDSA Signature Verification (bsc#1231564)\n- CVE-2024-9014: Fixed OAuth2 issue that could lead to information leak (bsc#1230928)\n", "title": "Description of the patch" }, { "category": "details", "text": "SUSE-2024-3771,SUSE-SLE-Module-Python3-15-SP6-2024-3771,openSUSE-SLE-15.6-2024-3771", "title": "Patchnames" }, { "category": "legal_disclaimer", "text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).", "title": "Terms of use" } ], "publisher": { "category": "vendor", "contact_details": "https://www.suse.com/support/security/contact/", "name": "SUSE Product Security Team", "namespace": "https://www.suse.com/" }, "references": [ { "category": "external", "summary": "SUSE ratings", "url": "https://www.suse.com/support/security/rating/" }, { "category": "self", "summary": "URL of this CSAF notice", "url": "https://ftp.suse.com/pub/projects/security/csaf/suse-su-2024_3771-1.json" }, { "category": "self", "summary": "URL for SUSE-SU-2024:3771-1", "url": "https://www.suse.com/support/update/announcement/2024/suse-su-20243771-1/" }, { "category": "self", "summary": "E-Mail link for SUSE-SU-2024:3771-1", "url": "https://lists.suse.com/pipermail/sle-security-updates/2024-October/019689.html" }, { "category": "self", "summary": "SUSE Bug 1224295", "url": "https://bugzilla.suse.com/1224295" }, { "category": "self", "summary": "SUSE Bug 1224366", "url": "https://bugzilla.suse.com/1224366" }, { "category": "self", "summary": "SUSE Bug 1226967", "url": "https://bugzilla.suse.com/1226967" }, { "category": "self", "summary": "SUSE Bug 1227248", "url": "https://bugzilla.suse.com/1227248" }, { "category": "self", "summary": "SUSE Bug 1227252", "url": "https://bugzilla.suse.com/1227252" }, { "category": "self", "summary": "SUSE Bug 1229423", "url": "https://bugzilla.suse.com/1229423" }, { "category": "self", "summary": "SUSE Bug 1229861", "url": "https://bugzilla.suse.com/1229861" }, { "category": "self", "summary": "SUSE Bug 1230928", "url": "https://bugzilla.suse.com/1230928" }, { "category": "self", "summary": "SUSE Bug 1231564", "url": "https://bugzilla.suse.com/1231564" }, { "category": "self", "summary": "SUSE Bug 1231684", "url": "https://bugzilla.suse.com/1231684" }, { "category": "self", "summary": "SUSE CVE CVE-2024-38355 page", "url": "https://www.suse.com/security/cve/CVE-2024-38355/" }, { "category": "self", "summary": "SUSE CVE CVE-2024-38998 page", "url": "https://www.suse.com/security/cve/CVE-2024-38998/" }, { "category": "self", "summary": "SUSE CVE CVE-2024-38999 page", "url": "https://www.suse.com/security/cve/CVE-2024-38999/" }, { "category": "self", "summary": "SUSE CVE CVE-2024-39338 page", "url": "https://www.suse.com/security/cve/CVE-2024-39338/" }, { "category": "self", "summary": "SUSE CVE CVE-2024-4067 page", "url": "https://www.suse.com/security/cve/CVE-2024-4067/" }, { "category": "self", "summary": "SUSE CVE CVE-2024-4068 page", "url": "https://www.suse.com/security/cve/CVE-2024-4068/" }, { "category": "self", "summary": "SUSE CVE CVE-2024-43788 page", "url": "https://www.suse.com/security/cve/CVE-2024-43788/" }, { "category": "self", "summary": "SUSE CVE CVE-2024-48948 page", "url": "https://www.suse.com/security/cve/CVE-2024-48948/" }, { "category": "self", "summary": "SUSE CVE CVE-2024-48949 page", "url": "https://www.suse.com/security/cve/CVE-2024-48949/" }, { "category": "self", "summary": "SUSE CVE CVE-2024-9014 page", "url": "https://www.suse.com/security/cve/CVE-2024-9014/" } ], "title": "Security update for pgadmin4", "tracking": { "current_release_date": "2024-10-29T12:55:34Z", "generator": { "date": "2024-10-29T12:55:34Z", "engine": { "name": "cve-database.git:bin/generate-csaf.pl", "version": "1" } }, "id": "SUSE-SU-2024:3771-1", "initial_release_date": "2024-10-29T12:55:34Z", "revision_history": [ { "date": "2024-10-29T12:55:34Z", "number": "1", "summary": "Current version" } ], "status": "final", "version": "1" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_version", "name": "pgadmin4-8.5-150600.3.6.1.noarch", "product": { "name": "pgadmin4-8.5-150600.3.6.1.noarch", "product_id": "pgadmin4-8.5-150600.3.6.1.noarch" } }, { "category": "product_version", "name": "pgadmin4-cloud-8.5-150600.3.6.1.noarch", "product": { "name": "pgadmin4-cloud-8.5-150600.3.6.1.noarch", "product_id": "pgadmin4-cloud-8.5-150600.3.6.1.noarch" } }, { "category": "product_version", "name": "pgadmin4-desktop-8.5-150600.3.6.1.noarch", "product": { "name": "pgadmin4-desktop-8.5-150600.3.6.1.noarch", "product_id": "pgadmin4-desktop-8.5-150600.3.6.1.noarch" } }, { "category": "product_version", "name": "pgadmin4-doc-8.5-150600.3.6.1.noarch", "product": { "name": "pgadmin4-doc-8.5-150600.3.6.1.noarch", "product_id": "pgadmin4-doc-8.5-150600.3.6.1.noarch" } }, { "category": "product_version", "name": "pgadmin4-web-uwsgi-8.5-150600.3.6.1.noarch", "product": { "name": "pgadmin4-web-uwsgi-8.5-150600.3.6.1.noarch", "product_id": "pgadmin4-web-uwsgi-8.5-150600.3.6.1.noarch" } }, { "category": "product_version", "name": "system-user-pgadmin-8.5-150600.3.6.1.noarch", "product": { "name": "system-user-pgadmin-8.5-150600.3.6.1.noarch", "product_id": "system-user-pgadmin-8.5-150600.3.6.1.noarch" } } ], "category": "architecture", "name": "noarch" }, { "branches": [ { "category": "product_name", "name": "SUSE Linux Enterprise Module for Python 3 15 SP6", "product": { "name": "SUSE Linux Enterprise Module for Python 3 15 SP6", "product_id": "SUSE Linux Enterprise Module for Python 3 15 SP6", "product_identification_helper": { "cpe": "cpe:/o:suse:sle-module-python3:15:sp6" } } }, { "category": "product_name", "name": "openSUSE Leap 15.6", "product": { "name": "openSUSE Leap 15.6", "product_id": "openSUSE Leap 15.6", "product_identification_helper": { "cpe": "cpe:/o:opensuse:leap:15.6" } } } ], "category": "product_family", "name": "SUSE Linux Enterprise" } ], "category": "vendor", "name": "SUSE" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "pgadmin4-8.5-150600.3.6.1.noarch as component of SUSE Linux Enterprise Module for Python 3 15 SP6", "product_id": "SUSE Linux Enterprise Module for Python 3 15 SP6:pgadmin4-8.5-150600.3.6.1.noarch" }, "product_reference": "pgadmin4-8.5-150600.3.6.1.noarch", "relates_to_product_reference": "SUSE Linux Enterprise Module for Python 3 15 SP6" }, { "category": "default_component_of", "full_product_name": { "name": "pgadmin4-doc-8.5-150600.3.6.1.noarch as component of SUSE Linux Enterprise Module for Python 3 15 SP6", "product_id": "SUSE Linux Enterprise Module for Python 3 15 SP6:pgadmin4-doc-8.5-150600.3.6.1.noarch" }, "product_reference": "pgadmin4-doc-8.5-150600.3.6.1.noarch", "relates_to_product_reference": "SUSE Linux Enterprise Module for Python 3 15 SP6" }, { "category": "default_component_of", "full_product_name": { "name": "system-user-pgadmin-8.5-150600.3.6.1.noarch as component of SUSE Linux Enterprise Module for Python 3 15 SP6", "product_id": "SUSE Linux Enterprise Module for Python 3 15 SP6:system-user-pgadmin-8.5-150600.3.6.1.noarch" }, "product_reference": "system-user-pgadmin-8.5-150600.3.6.1.noarch", "relates_to_product_reference": "SUSE Linux Enterprise Module for Python 3 15 SP6" }, { "category": "default_component_of", "full_product_name": { "name": "pgadmin4-8.5-150600.3.6.1.noarch as component of openSUSE Leap 15.6", "product_id": "openSUSE Leap 15.6:pgadmin4-8.5-150600.3.6.1.noarch" }, "product_reference": "pgadmin4-8.5-150600.3.6.1.noarch", "relates_to_product_reference": "openSUSE Leap 15.6" }, { "category": "default_component_of", "full_product_name": { "name": "pgadmin4-cloud-8.5-150600.3.6.1.noarch as component of openSUSE Leap 15.6", "product_id": "openSUSE Leap 15.6:pgadmin4-cloud-8.5-150600.3.6.1.noarch" }, "product_reference": "pgadmin4-cloud-8.5-150600.3.6.1.noarch", "relates_to_product_reference": "openSUSE Leap 15.6" }, { "category": "default_component_of", "full_product_name": { "name": "pgadmin4-desktop-8.5-150600.3.6.1.noarch as component of openSUSE Leap 15.6", "product_id": "openSUSE Leap 15.6:pgadmin4-desktop-8.5-150600.3.6.1.noarch" }, "product_reference": "pgadmin4-desktop-8.5-150600.3.6.1.noarch", "relates_to_product_reference": "openSUSE Leap 15.6" }, { "category": "default_component_of", "full_product_name": { "name": "pgadmin4-doc-8.5-150600.3.6.1.noarch as component of openSUSE Leap 15.6", "product_id": "openSUSE Leap 15.6:pgadmin4-doc-8.5-150600.3.6.1.noarch" }, "product_reference": "pgadmin4-doc-8.5-150600.3.6.1.noarch", "relates_to_product_reference": "openSUSE Leap 15.6" }, { "category": "default_component_of", "full_product_name": { "name": "pgadmin4-web-uwsgi-8.5-150600.3.6.1.noarch as component of openSUSE Leap 15.6", "product_id": "openSUSE Leap 15.6:pgadmin4-web-uwsgi-8.5-150600.3.6.1.noarch" }, "product_reference": "pgadmin4-web-uwsgi-8.5-150600.3.6.1.noarch", "relates_to_product_reference": "openSUSE Leap 15.6" }, { "category": "default_component_of", "full_product_name": { "name": "system-user-pgadmin-8.5-150600.3.6.1.noarch as component of openSUSE Leap 15.6", "product_id": "openSUSE Leap 15.6:system-user-pgadmin-8.5-150600.3.6.1.noarch" }, "product_reference": "system-user-pgadmin-8.5-150600.3.6.1.noarch", "relates_to_product_reference": "openSUSE Leap 15.6" } ] }, "vulnerabilities": [ { "cve": "CVE-2024-38355", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2024-38355" } ], "notes": [ { "category": "general", "text": "Socket.IO is an open source, real-time, bidirectional, event-based, communication framework. A specially crafted Socket.IO packet can trigger an uncaught exception on the Socket.IO server, thus killing the Node.js process. This issue is fixed by commit `15af22fc22` which has been included in `socket.io@4.6.2` (released in May 2023). The fix was backported in the 2.x branch as well with commit `d30630ba10`. Users are advised to upgrade. Users unable to upgrade may attach a listener for the \"error\" event to catch these errors.\n", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Module for Python 3 15 SP6:pgadmin4-8.5-150600.3.6.1.noarch", "SUSE Linux Enterprise Module for Python 3 15 SP6:pgadmin4-doc-8.5-150600.3.6.1.noarch", "SUSE Linux Enterprise Module for Python 3 15 SP6:system-user-pgadmin-8.5-150600.3.6.1.noarch", "openSUSE Leap 15.6:pgadmin4-8.5-150600.3.6.1.noarch", "openSUSE Leap 15.6:pgadmin4-cloud-8.5-150600.3.6.1.noarch", "openSUSE Leap 15.6:pgadmin4-desktop-8.5-150600.3.6.1.noarch", "openSUSE Leap 15.6:pgadmin4-doc-8.5-150600.3.6.1.noarch", "openSUSE Leap 15.6:pgadmin4-web-uwsgi-8.5-150600.3.6.1.noarch", "openSUSE Leap 15.6:system-user-pgadmin-8.5-150600.3.6.1.noarch" ] }, "references": [ { "category": "external", "summary": "CVE-2024-38355", "url": "https://www.suse.com/security/cve/CVE-2024-38355" }, { "category": "external", "summary": "SUSE Bug 1226965 for CVE-2024-38355", "url": "https://bugzilla.suse.com/1226965" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Module for Python 3 15 SP6:pgadmin4-8.5-150600.3.6.1.noarch", "SUSE Linux Enterprise Module for Python 3 15 SP6:pgadmin4-doc-8.5-150600.3.6.1.noarch", "SUSE Linux Enterprise Module for Python 3 15 SP6:system-user-pgadmin-8.5-150600.3.6.1.noarch", "openSUSE Leap 15.6:pgadmin4-8.5-150600.3.6.1.noarch", "openSUSE Leap 15.6:pgadmin4-cloud-8.5-150600.3.6.1.noarch", "openSUSE Leap 15.6:pgadmin4-desktop-8.5-150600.3.6.1.noarch", "openSUSE Leap 15.6:pgadmin4-doc-8.5-150600.3.6.1.noarch", "openSUSE Leap 15.6:pgadmin4-web-uwsgi-8.5-150600.3.6.1.noarch", "openSUSE Leap 15.6:system-user-pgadmin-8.5-150600.3.6.1.noarch" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Module for Python 3 15 SP6:pgadmin4-8.5-150600.3.6.1.noarch", "SUSE Linux Enterprise Module for Python 3 15 SP6:pgadmin4-doc-8.5-150600.3.6.1.noarch", "SUSE Linux Enterprise Module for Python 3 15 SP6:system-user-pgadmin-8.5-150600.3.6.1.noarch", "openSUSE Leap 15.6:pgadmin4-8.5-150600.3.6.1.noarch", "openSUSE Leap 15.6:pgadmin4-cloud-8.5-150600.3.6.1.noarch", "openSUSE Leap 15.6:pgadmin4-desktop-8.5-150600.3.6.1.noarch", "openSUSE Leap 15.6:pgadmin4-doc-8.5-150600.3.6.1.noarch", "openSUSE Leap 15.6:pgadmin4-web-uwsgi-8.5-150600.3.6.1.noarch", "openSUSE Leap 15.6:system-user-pgadmin-8.5-150600.3.6.1.noarch" ] } ], "threats": [ { "category": "impact", "date": "2024-10-29T12:55:34Z", "details": "important" } ], "title": "CVE-2024-38355" }, { "cve": "CVE-2024-38998", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2024-38998" } ], "notes": [ { "category": "general", "text": "DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: This candidate was withdrawn by its CNA. Further investigation showed that it was not a security issue. Notes: none.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Module for Python 3 15 SP6:pgadmin4-8.5-150600.3.6.1.noarch", "SUSE Linux Enterprise Module for Python 3 15 SP6:pgadmin4-doc-8.5-150600.3.6.1.noarch", "SUSE Linux Enterprise Module for Python 3 15 SP6:system-user-pgadmin-8.5-150600.3.6.1.noarch", "openSUSE Leap 15.6:pgadmin4-8.5-150600.3.6.1.noarch", "openSUSE Leap 15.6:pgadmin4-cloud-8.5-150600.3.6.1.noarch", "openSUSE Leap 15.6:pgadmin4-desktop-8.5-150600.3.6.1.noarch", "openSUSE Leap 15.6:pgadmin4-doc-8.5-150600.3.6.1.noarch", "openSUSE Leap 15.6:pgadmin4-web-uwsgi-8.5-150600.3.6.1.noarch", "openSUSE Leap 15.6:system-user-pgadmin-8.5-150600.3.6.1.noarch" ] }, "references": [ { "category": "external", "summary": "CVE-2024-38998", "url": "https://www.suse.com/security/cve/CVE-2024-38998" }, { "category": "external", "summary": "SUSE Bug 1227247 for CVE-2024-38998", "url": "https://bugzilla.suse.com/1227247" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Module for Python 3 15 SP6:pgadmin4-8.5-150600.3.6.1.noarch", "SUSE Linux Enterprise Module for Python 3 15 SP6:pgadmin4-doc-8.5-150600.3.6.1.noarch", "SUSE Linux Enterprise Module for Python 3 15 SP6:system-user-pgadmin-8.5-150600.3.6.1.noarch", "openSUSE Leap 15.6:pgadmin4-8.5-150600.3.6.1.noarch", "openSUSE Leap 15.6:pgadmin4-cloud-8.5-150600.3.6.1.noarch", "openSUSE Leap 15.6:pgadmin4-desktop-8.5-150600.3.6.1.noarch", "openSUSE Leap 15.6:pgadmin4-doc-8.5-150600.3.6.1.noarch", "openSUSE Leap 15.6:pgadmin4-web-uwsgi-8.5-150600.3.6.1.noarch", "openSUSE Leap 15.6:system-user-pgadmin-8.5-150600.3.6.1.noarch" ] } ], "scores": [ { "cvss_v3": { "baseScore": 8.6, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Module for Python 3 15 SP6:pgadmin4-8.5-150600.3.6.1.noarch", "SUSE Linux Enterprise Module for Python 3 15 SP6:pgadmin4-doc-8.5-150600.3.6.1.noarch", "SUSE Linux Enterprise Module for Python 3 15 SP6:system-user-pgadmin-8.5-150600.3.6.1.noarch", "openSUSE Leap 15.6:pgadmin4-8.5-150600.3.6.1.noarch", "openSUSE Leap 15.6:pgadmin4-cloud-8.5-150600.3.6.1.noarch", "openSUSE Leap 15.6:pgadmin4-desktop-8.5-150600.3.6.1.noarch", "openSUSE Leap 15.6:pgadmin4-doc-8.5-150600.3.6.1.noarch", "openSUSE Leap 15.6:pgadmin4-web-uwsgi-8.5-150600.3.6.1.noarch", "openSUSE Leap 15.6:system-user-pgadmin-8.5-150600.3.6.1.noarch" ] } ], "threats": [ { "category": "impact", "date": "2024-10-29T12:55:34Z", "details": "important" } ], "title": "CVE-2024-38998" }, { "cve": "CVE-2024-38999", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2024-38999" } ], "notes": [ { "category": "general", "text": "jrburke requirejs v2.3.6 was discovered to contain a prototype pollution via the function s.contexts._.configure. This vulnerability allows attackers to execute arbitrary code or cause a Denial of Service (DoS) via injecting arbitrary properties.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Module for Python 3 15 SP6:pgadmin4-8.5-150600.3.6.1.noarch", "SUSE Linux Enterprise Module for Python 3 15 SP6:pgadmin4-doc-8.5-150600.3.6.1.noarch", "SUSE Linux Enterprise Module for Python 3 15 SP6:system-user-pgadmin-8.5-150600.3.6.1.noarch", "openSUSE Leap 15.6:pgadmin4-8.5-150600.3.6.1.noarch", "openSUSE Leap 15.6:pgadmin4-cloud-8.5-150600.3.6.1.noarch", "openSUSE Leap 15.6:pgadmin4-desktop-8.5-150600.3.6.1.noarch", "openSUSE Leap 15.6:pgadmin4-doc-8.5-150600.3.6.1.noarch", "openSUSE Leap 15.6:pgadmin4-web-uwsgi-8.5-150600.3.6.1.noarch", "openSUSE Leap 15.6:system-user-pgadmin-8.5-150600.3.6.1.noarch" ] }, "references": [ { "category": "external", "summary": "CVE-2024-38999", "url": "https://www.suse.com/security/cve/CVE-2024-38999" }, { "category": "external", "summary": "SUSE Bug 1227251 for CVE-2024-38999", "url": "https://bugzilla.suse.com/1227251" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Module for Python 3 15 SP6:pgadmin4-8.5-150600.3.6.1.noarch", "SUSE Linux Enterprise Module for Python 3 15 SP6:pgadmin4-doc-8.5-150600.3.6.1.noarch", "SUSE Linux Enterprise Module for Python 3 15 SP6:system-user-pgadmin-8.5-150600.3.6.1.noarch", "openSUSE Leap 15.6:pgadmin4-8.5-150600.3.6.1.noarch", "openSUSE Leap 15.6:pgadmin4-cloud-8.5-150600.3.6.1.noarch", "openSUSE Leap 15.6:pgadmin4-desktop-8.5-150600.3.6.1.noarch", "openSUSE Leap 15.6:pgadmin4-doc-8.5-150600.3.6.1.noarch", "openSUSE Leap 15.6:pgadmin4-web-uwsgi-8.5-150600.3.6.1.noarch", "openSUSE Leap 15.6:system-user-pgadmin-8.5-150600.3.6.1.noarch" ] } ], "scores": [ { "cvss_v3": { "baseScore": 8.6, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Module for Python 3 15 SP6:pgadmin4-8.5-150600.3.6.1.noarch", "SUSE Linux Enterprise Module for Python 3 15 SP6:pgadmin4-doc-8.5-150600.3.6.1.noarch", "SUSE Linux Enterprise Module for Python 3 15 SP6:system-user-pgadmin-8.5-150600.3.6.1.noarch", "openSUSE Leap 15.6:pgadmin4-8.5-150600.3.6.1.noarch", "openSUSE Leap 15.6:pgadmin4-cloud-8.5-150600.3.6.1.noarch", "openSUSE Leap 15.6:pgadmin4-desktop-8.5-150600.3.6.1.noarch", "openSUSE Leap 15.6:pgadmin4-doc-8.5-150600.3.6.1.noarch", "openSUSE Leap 15.6:pgadmin4-web-uwsgi-8.5-150600.3.6.1.noarch", "openSUSE Leap 15.6:system-user-pgadmin-8.5-150600.3.6.1.noarch" ] } ], "threats": [ { "category": "impact", "date": "2024-10-29T12:55:34Z", "details": "important" } ], "title": "CVE-2024-38999" }, { "cve": "CVE-2024-39338", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2024-39338" } ], "notes": [ { "category": "general", "text": "axios 1.7.2 allows SSRF via unexpected behavior where requests for path relative URLs get processed as protocol relative URLs.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Module for Python 3 15 SP6:pgadmin4-8.5-150600.3.6.1.noarch", "SUSE Linux Enterprise Module for Python 3 15 SP6:pgadmin4-doc-8.5-150600.3.6.1.noarch", "SUSE Linux Enterprise Module for Python 3 15 SP6:system-user-pgadmin-8.5-150600.3.6.1.noarch", "openSUSE Leap 15.6:pgadmin4-8.5-150600.3.6.1.noarch", "openSUSE Leap 15.6:pgadmin4-cloud-8.5-150600.3.6.1.noarch", "openSUSE Leap 15.6:pgadmin4-desktop-8.5-150600.3.6.1.noarch", "openSUSE Leap 15.6:pgadmin4-doc-8.5-150600.3.6.1.noarch", "openSUSE Leap 15.6:pgadmin4-web-uwsgi-8.5-150600.3.6.1.noarch", "openSUSE Leap 15.6:system-user-pgadmin-8.5-150600.3.6.1.noarch" ] }, "references": [ { "category": "external", "summary": "CVE-2024-39338", "url": "https://www.suse.com/security/cve/CVE-2024-39338" }, { "category": "external", "summary": "SUSE Bug 1229421 for CVE-2024-39338", "url": "https://bugzilla.suse.com/1229421" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Module for Python 3 15 SP6:pgadmin4-8.5-150600.3.6.1.noarch", "SUSE Linux Enterprise Module for Python 3 15 SP6:pgadmin4-doc-8.5-150600.3.6.1.noarch", "SUSE Linux Enterprise Module for Python 3 15 SP6:system-user-pgadmin-8.5-150600.3.6.1.noarch", "openSUSE Leap 15.6:pgadmin4-8.5-150600.3.6.1.noarch", "openSUSE Leap 15.6:pgadmin4-cloud-8.5-150600.3.6.1.noarch", "openSUSE Leap 15.6:pgadmin4-desktop-8.5-150600.3.6.1.noarch", "openSUSE Leap 15.6:pgadmin4-doc-8.5-150600.3.6.1.noarch", "openSUSE Leap 15.6:pgadmin4-web-uwsgi-8.5-150600.3.6.1.noarch", "openSUSE Leap 15.6:system-user-pgadmin-8.5-150600.3.6.1.noarch" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.4, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Module for Python 3 15 SP6:pgadmin4-8.5-150600.3.6.1.noarch", "SUSE Linux Enterprise Module for Python 3 15 SP6:pgadmin4-doc-8.5-150600.3.6.1.noarch", "SUSE Linux Enterprise Module for Python 3 15 SP6:system-user-pgadmin-8.5-150600.3.6.1.noarch", "openSUSE Leap 15.6:pgadmin4-8.5-150600.3.6.1.noarch", "openSUSE Leap 15.6:pgadmin4-cloud-8.5-150600.3.6.1.noarch", "openSUSE Leap 15.6:pgadmin4-desktop-8.5-150600.3.6.1.noarch", "openSUSE Leap 15.6:pgadmin4-doc-8.5-150600.3.6.1.noarch", "openSUSE Leap 15.6:pgadmin4-web-uwsgi-8.5-150600.3.6.1.noarch", "openSUSE Leap 15.6:system-user-pgadmin-8.5-150600.3.6.1.noarch" ] } ], "threats": [ { "category": "impact", "date": "2024-10-29T12:55:34Z", "details": "important" } ], "title": "CVE-2024-39338" }, { "cve": "CVE-2024-4067", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2024-4067" } ], "notes": [ { "category": "general", "text": "The NPM package `micromatch` prior to 4.0.8 is vulnerable to Regular Expression Denial of Service (ReDoS). The vulnerability occurs in `micromatch.braces()` in `index.js` because the pattern `.*` will greedily match anything. By passing a malicious payload, the pattern matching will keep backtracking to the input while it doesn\u0027t find the closing bracket. As the input size increases, the consumption time will also increase until it causes the application to hang or slow down. There was a merged fix but further testing shows the issue persists. This issue should be mitigated by using a safe pattern that won\u0027t start backtracking the regular expression due to greedy matching. This issue was fixed in version 4.0.8.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Module for Python 3 15 SP6:pgadmin4-8.5-150600.3.6.1.noarch", "SUSE Linux Enterprise Module for Python 3 15 SP6:pgadmin4-doc-8.5-150600.3.6.1.noarch", "SUSE Linux Enterprise Module for Python 3 15 SP6:system-user-pgadmin-8.5-150600.3.6.1.noarch", "openSUSE Leap 15.6:pgadmin4-8.5-150600.3.6.1.noarch", "openSUSE Leap 15.6:pgadmin4-cloud-8.5-150600.3.6.1.noarch", "openSUSE Leap 15.6:pgadmin4-desktop-8.5-150600.3.6.1.noarch", "openSUSE Leap 15.6:pgadmin4-doc-8.5-150600.3.6.1.noarch", "openSUSE Leap 15.6:pgadmin4-web-uwsgi-8.5-150600.3.6.1.noarch", "openSUSE Leap 15.6:system-user-pgadmin-8.5-150600.3.6.1.noarch" ] }, "references": [ { "category": "external", "summary": "CVE-2024-4067", "url": "https://www.suse.com/security/cve/CVE-2024-4067" }, { "category": "external", "summary": "SUSE Bug 1224255 for CVE-2024-4067", "url": "https://bugzilla.suse.com/1224255" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Module for Python 3 15 SP6:pgadmin4-8.5-150600.3.6.1.noarch", "SUSE Linux Enterprise Module for Python 3 15 SP6:pgadmin4-doc-8.5-150600.3.6.1.noarch", "SUSE Linux Enterprise Module for Python 3 15 SP6:system-user-pgadmin-8.5-150600.3.6.1.noarch", "openSUSE Leap 15.6:pgadmin4-8.5-150600.3.6.1.noarch", "openSUSE Leap 15.6:pgadmin4-cloud-8.5-150600.3.6.1.noarch", "openSUSE Leap 15.6:pgadmin4-desktop-8.5-150600.3.6.1.noarch", "openSUSE Leap 15.6:pgadmin4-doc-8.5-150600.3.6.1.noarch", "openSUSE Leap 15.6:pgadmin4-web-uwsgi-8.5-150600.3.6.1.noarch", "openSUSE Leap 15.6:system-user-pgadmin-8.5-150600.3.6.1.noarch" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Module for Python 3 15 SP6:pgadmin4-8.5-150600.3.6.1.noarch", "SUSE Linux Enterprise Module for Python 3 15 SP6:pgadmin4-doc-8.5-150600.3.6.1.noarch", "SUSE Linux Enterprise Module for Python 3 15 SP6:system-user-pgadmin-8.5-150600.3.6.1.noarch", "openSUSE Leap 15.6:pgadmin4-8.5-150600.3.6.1.noarch", "openSUSE Leap 15.6:pgadmin4-cloud-8.5-150600.3.6.1.noarch", "openSUSE Leap 15.6:pgadmin4-desktop-8.5-150600.3.6.1.noarch", "openSUSE Leap 15.6:pgadmin4-doc-8.5-150600.3.6.1.noarch", "openSUSE Leap 15.6:pgadmin4-web-uwsgi-8.5-150600.3.6.1.noarch", "openSUSE Leap 15.6:system-user-pgadmin-8.5-150600.3.6.1.noarch" ] } ], "threats": [ { "category": "impact", "date": "2024-10-29T12:55:34Z", "details": "important" } ], "title": "CVE-2024-4067" }, { "cve": "CVE-2024-4068", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2024-4068" } ], "notes": [ { "category": "general", "text": "The NPM package `braces`, versions prior to 3.0.3, fails to limit the number of characters it can handle, which could lead to Memory Exhaustion. In `lib/parse.js,` if a malicious user sends \"imbalanced braces\" as input, the parsing will enter a loop, which will cause the program to start allocating heap memory without freeing it at any moment of the loop. Eventually, the JavaScript heap limit is reached, and the program will crash.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Module for Python 3 15 SP6:pgadmin4-8.5-150600.3.6.1.noarch", "SUSE Linux Enterprise Module for Python 3 15 SP6:pgadmin4-doc-8.5-150600.3.6.1.noarch", "SUSE Linux Enterprise Module for Python 3 15 SP6:system-user-pgadmin-8.5-150600.3.6.1.noarch", "openSUSE Leap 15.6:pgadmin4-8.5-150600.3.6.1.noarch", "openSUSE Leap 15.6:pgadmin4-cloud-8.5-150600.3.6.1.noarch", "openSUSE Leap 15.6:pgadmin4-desktop-8.5-150600.3.6.1.noarch", "openSUSE Leap 15.6:pgadmin4-doc-8.5-150600.3.6.1.noarch", "openSUSE Leap 15.6:pgadmin4-web-uwsgi-8.5-150600.3.6.1.noarch", "openSUSE Leap 15.6:system-user-pgadmin-8.5-150600.3.6.1.noarch" ] }, "references": [ { "category": "external", "summary": "CVE-2024-4068", "url": "https://www.suse.com/security/cve/CVE-2024-4068" }, { "category": "external", "summary": "SUSE Bug 1224256 for CVE-2024-4068", "url": "https://bugzilla.suse.com/1224256" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Module for Python 3 15 SP6:pgadmin4-8.5-150600.3.6.1.noarch", "SUSE Linux Enterprise Module for Python 3 15 SP6:pgadmin4-doc-8.5-150600.3.6.1.noarch", "SUSE Linux Enterprise Module for Python 3 15 SP6:system-user-pgadmin-8.5-150600.3.6.1.noarch", "openSUSE Leap 15.6:pgadmin4-8.5-150600.3.6.1.noarch", "openSUSE Leap 15.6:pgadmin4-cloud-8.5-150600.3.6.1.noarch", "openSUSE Leap 15.6:pgadmin4-desktop-8.5-150600.3.6.1.noarch", "openSUSE Leap 15.6:pgadmin4-doc-8.5-150600.3.6.1.noarch", "openSUSE Leap 15.6:pgadmin4-web-uwsgi-8.5-150600.3.6.1.noarch", "openSUSE Leap 15.6:system-user-pgadmin-8.5-150600.3.6.1.noarch" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Module for Python 3 15 SP6:pgadmin4-8.5-150600.3.6.1.noarch", "SUSE Linux Enterprise Module for Python 3 15 SP6:pgadmin4-doc-8.5-150600.3.6.1.noarch", "SUSE Linux Enterprise Module for Python 3 15 SP6:system-user-pgadmin-8.5-150600.3.6.1.noarch", "openSUSE Leap 15.6:pgadmin4-8.5-150600.3.6.1.noarch", "openSUSE Leap 15.6:pgadmin4-cloud-8.5-150600.3.6.1.noarch", "openSUSE Leap 15.6:pgadmin4-desktop-8.5-150600.3.6.1.noarch", "openSUSE Leap 15.6:pgadmin4-doc-8.5-150600.3.6.1.noarch", "openSUSE Leap 15.6:pgadmin4-web-uwsgi-8.5-150600.3.6.1.noarch", "openSUSE Leap 15.6:system-user-pgadmin-8.5-150600.3.6.1.noarch" ] } ], "threats": [ { "category": "impact", "date": "2024-10-29T12:55:34Z", "details": "important" } ], "title": "CVE-2024-4068" }, { "cve": "CVE-2024-43788", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2024-43788" } ], "notes": [ { "category": "general", "text": "Webpack is a module bundler. Its main purpose is to bundle JavaScript files for usage in a browser, yet it is also capable of transforming, bundling, or packaging just about any resource or asset. The webpack developers have discovered a DOM Clobbering vulnerability in Webpack\u0027s `AutoPublicPathRuntimeModule`. The DOM Clobbering gadget in the module can lead to cross-site scripting (XSS) in web pages where scriptless attacker-controlled HTML elements (e.g., an `img` tag with an unsanitized `name` attribute) are present. Real-world exploitation of this gadget has been observed in the Canvas LMS which allows a XSS attack to happen through a javascript code compiled by Webpack (the vulnerable part is from Webpack). DOM Clobbering is a type of code-reuse attack where the attacker first embeds a piece of non-script, seemingly benign HTML markups in the webpage (e.g. through a post or comment) and leverages the gadgets (pieces of js code) living in the existing javascript code to transform it into executable code. This vulnerability can lead to cross-site scripting (XSS) on websites that include Webpack-generated files and allow users to inject certain scriptless HTML tags with improperly sanitized name or id attributes. This issue has been addressed in release version 5.94.0. All users are advised to upgrade. There are no known workarounds for this issue.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Module for Python 3 15 SP6:pgadmin4-8.5-150600.3.6.1.noarch", "SUSE Linux Enterprise Module for Python 3 15 SP6:pgadmin4-doc-8.5-150600.3.6.1.noarch", "SUSE Linux Enterprise Module for Python 3 15 SP6:system-user-pgadmin-8.5-150600.3.6.1.noarch", "openSUSE Leap 15.6:pgadmin4-8.5-150600.3.6.1.noarch", "openSUSE Leap 15.6:pgadmin4-cloud-8.5-150600.3.6.1.noarch", "openSUSE Leap 15.6:pgadmin4-desktop-8.5-150600.3.6.1.noarch", "openSUSE Leap 15.6:pgadmin4-doc-8.5-150600.3.6.1.noarch", "openSUSE Leap 15.6:pgadmin4-web-uwsgi-8.5-150600.3.6.1.noarch", "openSUSE Leap 15.6:system-user-pgadmin-8.5-150600.3.6.1.noarch" ] }, "references": [ { "category": "external", "summary": "CVE-2024-43788", "url": "https://www.suse.com/security/cve/CVE-2024-43788" }, { "category": "external", "summary": "SUSE Bug 1229860 for CVE-2024-43788", "url": "https://bugzilla.suse.com/1229860" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Module for Python 3 15 SP6:pgadmin4-8.5-150600.3.6.1.noarch", "SUSE Linux Enterprise Module for Python 3 15 SP6:pgadmin4-doc-8.5-150600.3.6.1.noarch", "SUSE Linux Enterprise Module for Python 3 15 SP6:system-user-pgadmin-8.5-150600.3.6.1.noarch", "openSUSE Leap 15.6:pgadmin4-8.5-150600.3.6.1.noarch", "openSUSE Leap 15.6:pgadmin4-cloud-8.5-150600.3.6.1.noarch", "openSUSE Leap 15.6:pgadmin4-desktop-8.5-150600.3.6.1.noarch", "openSUSE Leap 15.6:pgadmin4-doc-8.5-150600.3.6.1.noarch", "openSUSE Leap 15.6:pgadmin4-web-uwsgi-8.5-150600.3.6.1.noarch", "openSUSE Leap 15.6:system-user-pgadmin-8.5-150600.3.6.1.noarch" ] } ], "scores": [ { "cvss_v3": { "baseScore": 6.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:L/I:L/A:L", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Module for Python 3 15 SP6:pgadmin4-8.5-150600.3.6.1.noarch", "SUSE Linux Enterprise Module for Python 3 15 SP6:pgadmin4-doc-8.5-150600.3.6.1.noarch", "SUSE Linux Enterprise Module for Python 3 15 SP6:system-user-pgadmin-8.5-150600.3.6.1.noarch", "openSUSE Leap 15.6:pgadmin4-8.5-150600.3.6.1.noarch", "openSUSE Leap 15.6:pgadmin4-cloud-8.5-150600.3.6.1.noarch", "openSUSE Leap 15.6:pgadmin4-desktop-8.5-150600.3.6.1.noarch", "openSUSE Leap 15.6:pgadmin4-doc-8.5-150600.3.6.1.noarch", "openSUSE Leap 15.6:pgadmin4-web-uwsgi-8.5-150600.3.6.1.noarch", "openSUSE Leap 15.6:system-user-pgadmin-8.5-150600.3.6.1.noarch" ] } ], "threats": [ { "category": "impact", "date": "2024-10-29T12:55:34Z", "details": "moderate" } ], "title": "CVE-2024-43788" }, { "cve": "CVE-2024-48948", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2024-48948" } ], "notes": [ { "category": "general", "text": "The Elliptic package 6.5.7 for Node.js, in its for ECDSA implementation, does not correctly verify valid signatures if the hash contains at least four leading 0 bytes and when the order of the elliptic curve\u0027s base point is smaller than the hash, because of an _truncateToN anomaly. This leads to valid signatures being rejected. Legitimate transactions or communications may be incorrectly flagged as invalid.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Module for Python 3 15 SP6:pgadmin4-8.5-150600.3.6.1.noarch", "SUSE Linux Enterprise Module for Python 3 15 SP6:pgadmin4-doc-8.5-150600.3.6.1.noarch", "SUSE Linux Enterprise Module for Python 3 15 SP6:system-user-pgadmin-8.5-150600.3.6.1.noarch", "openSUSE Leap 15.6:pgadmin4-8.5-150600.3.6.1.noarch", "openSUSE Leap 15.6:pgadmin4-cloud-8.5-150600.3.6.1.noarch", "openSUSE Leap 15.6:pgadmin4-desktop-8.5-150600.3.6.1.noarch", "openSUSE Leap 15.6:pgadmin4-doc-8.5-150600.3.6.1.noarch", "openSUSE Leap 15.6:pgadmin4-web-uwsgi-8.5-150600.3.6.1.noarch", "openSUSE Leap 15.6:system-user-pgadmin-8.5-150600.3.6.1.noarch" ] }, "references": [ { "category": "external", "summary": "CVE-2024-48948", "url": "https://www.suse.com/security/cve/CVE-2024-48948" }, { "category": "external", "summary": "SUSE Bug 1231681 for CVE-2024-48948", "url": "https://bugzilla.suse.com/1231681" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Module for Python 3 15 SP6:pgadmin4-8.5-150600.3.6.1.noarch", "SUSE Linux Enterprise Module for Python 3 15 SP6:pgadmin4-doc-8.5-150600.3.6.1.noarch", "SUSE Linux Enterprise Module for Python 3 15 SP6:system-user-pgadmin-8.5-150600.3.6.1.noarch", "openSUSE Leap 15.6:pgadmin4-8.5-150600.3.6.1.noarch", "openSUSE Leap 15.6:pgadmin4-cloud-8.5-150600.3.6.1.noarch", "openSUSE Leap 15.6:pgadmin4-desktop-8.5-150600.3.6.1.noarch", "openSUSE Leap 15.6:pgadmin4-doc-8.5-150600.3.6.1.noarch", "openSUSE Leap 15.6:pgadmin4-web-uwsgi-8.5-150600.3.6.1.noarch", "openSUSE Leap 15.6:system-user-pgadmin-8.5-150600.3.6.1.noarch" ] } ], "scores": [ { "cvss_v3": { "baseScore": 4.8, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:L", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Module for Python 3 15 SP6:pgadmin4-8.5-150600.3.6.1.noarch", "SUSE Linux Enterprise Module for Python 3 15 SP6:pgadmin4-doc-8.5-150600.3.6.1.noarch", "SUSE Linux Enterprise Module for Python 3 15 SP6:system-user-pgadmin-8.5-150600.3.6.1.noarch", "openSUSE Leap 15.6:pgadmin4-8.5-150600.3.6.1.noarch", "openSUSE Leap 15.6:pgadmin4-cloud-8.5-150600.3.6.1.noarch", "openSUSE Leap 15.6:pgadmin4-desktop-8.5-150600.3.6.1.noarch", "openSUSE Leap 15.6:pgadmin4-doc-8.5-150600.3.6.1.noarch", "openSUSE Leap 15.6:pgadmin4-web-uwsgi-8.5-150600.3.6.1.noarch", "openSUSE Leap 15.6:system-user-pgadmin-8.5-150600.3.6.1.noarch" ] } ], "threats": [ { "category": "impact", "date": "2024-10-29T12:55:34Z", "details": "moderate" } ], "title": "CVE-2024-48948" }, { "cve": "CVE-2024-48949", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2024-48949" } ], "notes": [ { "category": "general", "text": "The verify function in lib/elliptic/eddsa/index.js in the Elliptic package before 6.5.6 for Node.js omits \"sig.S().gte(sig.eddsa.curve.n) || sig.S().isNeg()\" validation.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Module for Python 3 15 SP6:pgadmin4-8.5-150600.3.6.1.noarch", "SUSE Linux Enterprise Module for Python 3 15 SP6:pgadmin4-doc-8.5-150600.3.6.1.noarch", "SUSE Linux Enterprise Module for Python 3 15 SP6:system-user-pgadmin-8.5-150600.3.6.1.noarch", "openSUSE Leap 15.6:pgadmin4-8.5-150600.3.6.1.noarch", "openSUSE Leap 15.6:pgadmin4-cloud-8.5-150600.3.6.1.noarch", "openSUSE Leap 15.6:pgadmin4-desktop-8.5-150600.3.6.1.noarch", "openSUSE Leap 15.6:pgadmin4-doc-8.5-150600.3.6.1.noarch", "openSUSE Leap 15.6:pgadmin4-web-uwsgi-8.5-150600.3.6.1.noarch", "openSUSE Leap 15.6:system-user-pgadmin-8.5-150600.3.6.1.noarch" ] }, "references": [ { "category": "external", "summary": "CVE-2024-48949", "url": "https://www.suse.com/security/cve/CVE-2024-48949" }, { "category": "external", "summary": "SUSE Bug 1231557 for CVE-2024-48949", "url": "https://bugzilla.suse.com/1231557" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Module for Python 3 15 SP6:pgadmin4-8.5-150600.3.6.1.noarch", "SUSE Linux Enterprise Module for Python 3 15 SP6:pgadmin4-doc-8.5-150600.3.6.1.noarch", "SUSE Linux Enterprise Module for Python 3 15 SP6:system-user-pgadmin-8.5-150600.3.6.1.noarch", "openSUSE Leap 15.6:pgadmin4-8.5-150600.3.6.1.noarch", "openSUSE Leap 15.6:pgadmin4-cloud-8.5-150600.3.6.1.noarch", "openSUSE Leap 15.6:pgadmin4-desktop-8.5-150600.3.6.1.noarch", "openSUSE Leap 15.6:pgadmin4-doc-8.5-150600.3.6.1.noarch", "openSUSE Leap 15.6:pgadmin4-web-uwsgi-8.5-150600.3.6.1.noarch", "openSUSE Leap 15.6:system-user-pgadmin-8.5-150600.3.6.1.noarch" ] } ], "scores": [ { "cvss_v3": { "baseScore": 8.2, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:L/A:N", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Module for Python 3 15 SP6:pgadmin4-8.5-150600.3.6.1.noarch", "SUSE Linux Enterprise Module for Python 3 15 SP6:pgadmin4-doc-8.5-150600.3.6.1.noarch", "SUSE Linux Enterprise Module for Python 3 15 SP6:system-user-pgadmin-8.5-150600.3.6.1.noarch", "openSUSE Leap 15.6:pgadmin4-8.5-150600.3.6.1.noarch", "openSUSE Leap 15.6:pgadmin4-cloud-8.5-150600.3.6.1.noarch", "openSUSE Leap 15.6:pgadmin4-desktop-8.5-150600.3.6.1.noarch", "openSUSE Leap 15.6:pgadmin4-doc-8.5-150600.3.6.1.noarch", "openSUSE Leap 15.6:pgadmin4-web-uwsgi-8.5-150600.3.6.1.noarch", "openSUSE Leap 15.6:system-user-pgadmin-8.5-150600.3.6.1.noarch" ] } ], "threats": [ { "category": "impact", "date": "2024-10-29T12:55:34Z", "details": "important" } ], "title": "CVE-2024-48949" }, { "cve": "CVE-2024-9014", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2024-9014" } ], "notes": [ { "category": "general", "text": "pgAdmin versions 8.11 and earlier are vulnerable to a security flaw in OAuth2 authentication. This vulnerability allows an attacker to potentially obtain the client ID and secret, leading to unauthorized access to user data.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Module for Python 3 15 SP6:pgadmin4-8.5-150600.3.6.1.noarch", "SUSE Linux Enterprise Module for Python 3 15 SP6:pgadmin4-doc-8.5-150600.3.6.1.noarch", "SUSE Linux Enterprise Module for Python 3 15 SP6:system-user-pgadmin-8.5-150600.3.6.1.noarch", "openSUSE Leap 15.6:pgadmin4-8.5-150600.3.6.1.noarch", "openSUSE Leap 15.6:pgadmin4-cloud-8.5-150600.3.6.1.noarch", "openSUSE Leap 15.6:pgadmin4-desktop-8.5-150600.3.6.1.noarch", "openSUSE Leap 15.6:pgadmin4-doc-8.5-150600.3.6.1.noarch", "openSUSE Leap 15.6:pgadmin4-web-uwsgi-8.5-150600.3.6.1.noarch", "openSUSE Leap 15.6:system-user-pgadmin-8.5-150600.3.6.1.noarch" ] }, "references": [ { "category": "external", "summary": "CVE-2024-9014", "url": "https://www.suse.com/security/cve/CVE-2024-9014" }, { "category": "external", "summary": "SUSE Bug 1230928 for CVE-2024-9014", "url": "https://bugzilla.suse.com/1230928" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Module for Python 3 15 SP6:pgadmin4-8.5-150600.3.6.1.noarch", "SUSE Linux Enterprise Module for Python 3 15 SP6:pgadmin4-doc-8.5-150600.3.6.1.noarch", "SUSE Linux Enterprise Module for Python 3 15 SP6:system-user-pgadmin-8.5-150600.3.6.1.noarch", "openSUSE Leap 15.6:pgadmin4-8.5-150600.3.6.1.noarch", "openSUSE Leap 15.6:pgadmin4-cloud-8.5-150600.3.6.1.noarch", "openSUSE Leap 15.6:pgadmin4-desktop-8.5-150600.3.6.1.noarch", "openSUSE Leap 15.6:pgadmin4-doc-8.5-150600.3.6.1.noarch", "openSUSE Leap 15.6:pgadmin4-web-uwsgi-8.5-150600.3.6.1.noarch", "openSUSE Leap 15.6:system-user-pgadmin-8.5-150600.3.6.1.noarch" ] } ], "scores": [ { "cvss_v3": { "baseScore": 8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Module for Python 3 15 SP6:pgadmin4-8.5-150600.3.6.1.noarch", "SUSE Linux Enterprise Module for Python 3 15 SP6:pgadmin4-doc-8.5-150600.3.6.1.noarch", "SUSE Linux Enterprise Module for Python 3 15 SP6:system-user-pgadmin-8.5-150600.3.6.1.noarch", "openSUSE Leap 15.6:pgadmin4-8.5-150600.3.6.1.noarch", "openSUSE Leap 15.6:pgadmin4-cloud-8.5-150600.3.6.1.noarch", "openSUSE Leap 15.6:pgadmin4-desktop-8.5-150600.3.6.1.noarch", "openSUSE Leap 15.6:pgadmin4-doc-8.5-150600.3.6.1.noarch", "openSUSE Leap 15.6:pgadmin4-web-uwsgi-8.5-150600.3.6.1.noarch", "openSUSE Leap 15.6:system-user-pgadmin-8.5-150600.3.6.1.noarch" ] } ], "threats": [ { "category": "impact", "date": "2024-10-29T12:55:34Z", "details": "important" } ], "title": "CVE-2024-9014" } ] }
opensuse-su-2025:14983-1
Vulnerability from csaf_opensuse
Published
2025-04-10 00:00
Modified
2025-04-10 00:00
Summary
pgadmin4-9.2-1.1 on GA media
Notes
Title of the patch
pgadmin4-9.2-1.1 on GA media
Description of the patch
These are all security issues fixed in the pgadmin4-9.2-1.1 package on the GA media of openSUSE Tumbleweed.
Patchnames
openSUSE-Tumbleweed-2025-14983
Terms of use
CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).
{ "document": { "aggregate_severity": { "namespace": "https://www.suse.com/support/security/rating/", "text": "moderate" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright 2024 SUSE LLC. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "pgadmin4-9.2-1.1 on GA media", "title": "Title of the patch" }, { "category": "description", "text": "These are all security issues fixed in the pgadmin4-9.2-1.1 package on the GA media of openSUSE Tumbleweed.", "title": "Description of the patch" }, { "category": "details", "text": "openSUSE-Tumbleweed-2025-14983", "title": "Patchnames" }, { "category": "legal_disclaimer", "text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).", "title": "Terms of use" } ], "publisher": { "category": "vendor", "contact_details": "https://www.suse.com/support/security/contact/", "name": "SUSE Product Security Team", "namespace": "https://www.suse.com/" }, "references": [ { "category": "external", "summary": "SUSE ratings", "url": "https://www.suse.com/support/security/rating/" }, { "category": "self", "summary": "URL of this CSAF notice", "url": "https://ftp.suse.com/pub/projects/security/csaf/opensuse-su-2025_14983-1.json" }, { "category": "self", "summary": "URL for openSUSE-SU-2025:14983-1", "url": "https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/BYON52PV4P44MGBG55FDOG2SP2G266ZO/" }, { "category": "self", "summary": "E-Mail link for openSUSE-SU-2025:14983-1", "url": "https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/BYON52PV4P44MGBG55FDOG2SP2G266ZO/" }, { "category": "self", "summary": "SUSE CVE CVE-2024-6238 page", "url": "https://www.suse.com/security/cve/CVE-2024-6238/" }, { "category": "self", "summary": "SUSE CVE CVE-2024-9014 page", "url": "https://www.suse.com/security/cve/CVE-2024-9014/" }, { "category": "self", "summary": "SUSE CVE CVE-2025-2945 page", "url": "https://www.suse.com/security/cve/CVE-2025-2945/" }, { "category": "self", "summary": "SUSE CVE CVE-2025-2946 page", "url": "https://www.suse.com/security/cve/CVE-2025-2946/" } ], "title": "pgadmin4-9.2-1.1 on GA media", "tracking": { "current_release_date": "2025-04-10T00:00:00Z", "generator": { "date": "2025-04-10T00:00:00Z", "engine": { "name": "cve-database.git:bin/generate-csaf.pl", "version": "1" } }, "id": "openSUSE-SU-2025:14983-1", "initial_release_date": "2025-04-10T00:00:00Z", "revision_history": [ { "date": "2025-04-10T00:00:00Z", "number": "1", "summary": "Current version" } ], "status": "final", "version": "1" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_version", "name": "pgadmin4-9.2-1.1.aarch64", "product": { "name": "pgadmin4-9.2-1.1.aarch64", "product_id": "pgadmin4-9.2-1.1.aarch64" } }, { "category": "product_version", "name": "pgadmin4-cloud-9.2-1.1.aarch64", "product": { "name": "pgadmin4-cloud-9.2-1.1.aarch64", "product_id": "pgadmin4-cloud-9.2-1.1.aarch64" } }, { "category": "product_version", "name": "pgadmin4-desktop-9.2-1.1.aarch64", "product": { "name": "pgadmin4-desktop-9.2-1.1.aarch64", "product_id": "pgadmin4-desktop-9.2-1.1.aarch64" } }, { "category": "product_version", "name": "pgadmin4-doc-9.2-1.1.aarch64", "product": { "name": "pgadmin4-doc-9.2-1.1.aarch64", "product_id": "pgadmin4-doc-9.2-1.1.aarch64" } }, { "category": "product_version", "name": "pgadmin4-web-uwsgi-9.2-1.1.aarch64", "product": { "name": "pgadmin4-web-uwsgi-9.2-1.1.aarch64", "product_id": "pgadmin4-web-uwsgi-9.2-1.1.aarch64" } }, { "category": "product_version", "name": "system-user-pgadmin-9.2-1.1.aarch64", "product": { "name": "system-user-pgadmin-9.2-1.1.aarch64", "product_id": "system-user-pgadmin-9.2-1.1.aarch64" } } ], "category": "architecture", "name": "aarch64" }, { "branches": [ { "category": "product_version", "name": "pgadmin4-9.2-1.1.ppc64le", "product": { "name": "pgadmin4-9.2-1.1.ppc64le", "product_id": "pgadmin4-9.2-1.1.ppc64le" } }, { "category": "product_version", "name": "pgadmin4-cloud-9.2-1.1.ppc64le", "product": { "name": "pgadmin4-cloud-9.2-1.1.ppc64le", "product_id": "pgadmin4-cloud-9.2-1.1.ppc64le" } }, { "category": "product_version", "name": "pgadmin4-desktop-9.2-1.1.ppc64le", "product": { "name": "pgadmin4-desktop-9.2-1.1.ppc64le", "product_id": "pgadmin4-desktop-9.2-1.1.ppc64le" } }, { "category": "product_version", "name": "pgadmin4-doc-9.2-1.1.ppc64le", "product": { "name": "pgadmin4-doc-9.2-1.1.ppc64le", "product_id": "pgadmin4-doc-9.2-1.1.ppc64le" } }, { "category": "product_version", "name": "pgadmin4-web-uwsgi-9.2-1.1.ppc64le", "product": { "name": "pgadmin4-web-uwsgi-9.2-1.1.ppc64le", "product_id": "pgadmin4-web-uwsgi-9.2-1.1.ppc64le" } }, { "category": "product_version", "name": "system-user-pgadmin-9.2-1.1.ppc64le", "product": { "name": "system-user-pgadmin-9.2-1.1.ppc64le", "product_id": "system-user-pgadmin-9.2-1.1.ppc64le" } } ], "category": "architecture", "name": "ppc64le" }, { "branches": [ { "category": "product_version", "name": "pgadmin4-9.2-1.1.s390x", "product": { "name": "pgadmin4-9.2-1.1.s390x", "product_id": "pgadmin4-9.2-1.1.s390x" } }, { "category": "product_version", "name": "pgadmin4-cloud-9.2-1.1.s390x", "product": { "name": "pgadmin4-cloud-9.2-1.1.s390x", "product_id": "pgadmin4-cloud-9.2-1.1.s390x" } }, { "category": "product_version", "name": "pgadmin4-desktop-9.2-1.1.s390x", "product": { "name": "pgadmin4-desktop-9.2-1.1.s390x", "product_id": "pgadmin4-desktop-9.2-1.1.s390x" } }, { "category": "product_version", "name": "pgadmin4-doc-9.2-1.1.s390x", "product": { "name": "pgadmin4-doc-9.2-1.1.s390x", "product_id": "pgadmin4-doc-9.2-1.1.s390x" } }, { "category": "product_version", "name": "pgadmin4-web-uwsgi-9.2-1.1.s390x", "product": { "name": "pgadmin4-web-uwsgi-9.2-1.1.s390x", "product_id": "pgadmin4-web-uwsgi-9.2-1.1.s390x" } }, { "category": "product_version", "name": "system-user-pgadmin-9.2-1.1.s390x", "product": { "name": "system-user-pgadmin-9.2-1.1.s390x", "product_id": "system-user-pgadmin-9.2-1.1.s390x" } } ], "category": "architecture", "name": "s390x" }, { "branches": [ { "category": "product_version", "name": "pgadmin4-9.2-1.1.x86_64", "product": { "name": "pgadmin4-9.2-1.1.x86_64", "product_id": "pgadmin4-9.2-1.1.x86_64" } }, { "category": "product_version", "name": "pgadmin4-cloud-9.2-1.1.x86_64", "product": { "name": "pgadmin4-cloud-9.2-1.1.x86_64", "product_id": "pgadmin4-cloud-9.2-1.1.x86_64" } }, { "category": "product_version", "name": "pgadmin4-desktop-9.2-1.1.x86_64", "product": { "name": "pgadmin4-desktop-9.2-1.1.x86_64", "product_id": "pgadmin4-desktop-9.2-1.1.x86_64" } }, { "category": "product_version", "name": "pgadmin4-doc-9.2-1.1.x86_64", "product": { "name": "pgadmin4-doc-9.2-1.1.x86_64", "product_id": "pgadmin4-doc-9.2-1.1.x86_64" } }, { "category": "product_version", "name": "pgadmin4-web-uwsgi-9.2-1.1.x86_64", "product": { "name": "pgadmin4-web-uwsgi-9.2-1.1.x86_64", "product_id": "pgadmin4-web-uwsgi-9.2-1.1.x86_64" } }, { "category": "product_version", "name": "system-user-pgadmin-9.2-1.1.x86_64", "product": { "name": "system-user-pgadmin-9.2-1.1.x86_64", "product_id": "system-user-pgadmin-9.2-1.1.x86_64" } } ], "category": "architecture", "name": "x86_64" }, { "branches": [ { "category": "product_name", "name": "openSUSE Tumbleweed", "product": { "name": "openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed", "product_identification_helper": { "cpe": "cpe:/o:opensuse:tumbleweed" } } } ], "category": "product_family", "name": "SUSE Linux Enterprise" } ], "category": "vendor", "name": "SUSE" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "pgadmin4-9.2-1.1.aarch64 as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:pgadmin4-9.2-1.1.aarch64" }, "product_reference": "pgadmin4-9.2-1.1.aarch64", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "pgadmin4-9.2-1.1.ppc64le as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:pgadmin4-9.2-1.1.ppc64le" }, "product_reference": "pgadmin4-9.2-1.1.ppc64le", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "pgadmin4-9.2-1.1.s390x as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:pgadmin4-9.2-1.1.s390x" }, "product_reference": "pgadmin4-9.2-1.1.s390x", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "pgadmin4-9.2-1.1.x86_64 as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:pgadmin4-9.2-1.1.x86_64" }, "product_reference": "pgadmin4-9.2-1.1.x86_64", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "pgadmin4-cloud-9.2-1.1.aarch64 as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:pgadmin4-cloud-9.2-1.1.aarch64" }, "product_reference": "pgadmin4-cloud-9.2-1.1.aarch64", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "pgadmin4-cloud-9.2-1.1.ppc64le as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:pgadmin4-cloud-9.2-1.1.ppc64le" }, "product_reference": "pgadmin4-cloud-9.2-1.1.ppc64le", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "pgadmin4-cloud-9.2-1.1.s390x as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:pgadmin4-cloud-9.2-1.1.s390x" }, "product_reference": "pgadmin4-cloud-9.2-1.1.s390x", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "pgadmin4-cloud-9.2-1.1.x86_64 as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:pgadmin4-cloud-9.2-1.1.x86_64" }, "product_reference": "pgadmin4-cloud-9.2-1.1.x86_64", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "pgadmin4-desktop-9.2-1.1.aarch64 as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:pgadmin4-desktop-9.2-1.1.aarch64" }, "product_reference": "pgadmin4-desktop-9.2-1.1.aarch64", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "pgadmin4-desktop-9.2-1.1.ppc64le as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:pgadmin4-desktop-9.2-1.1.ppc64le" }, "product_reference": "pgadmin4-desktop-9.2-1.1.ppc64le", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "pgadmin4-desktop-9.2-1.1.s390x as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:pgadmin4-desktop-9.2-1.1.s390x" }, "product_reference": "pgadmin4-desktop-9.2-1.1.s390x", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "pgadmin4-desktop-9.2-1.1.x86_64 as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:pgadmin4-desktop-9.2-1.1.x86_64" }, "product_reference": "pgadmin4-desktop-9.2-1.1.x86_64", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "pgadmin4-doc-9.2-1.1.aarch64 as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:pgadmin4-doc-9.2-1.1.aarch64" }, "product_reference": "pgadmin4-doc-9.2-1.1.aarch64", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "pgadmin4-doc-9.2-1.1.ppc64le as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:pgadmin4-doc-9.2-1.1.ppc64le" }, "product_reference": "pgadmin4-doc-9.2-1.1.ppc64le", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "pgadmin4-doc-9.2-1.1.s390x as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:pgadmin4-doc-9.2-1.1.s390x" }, "product_reference": "pgadmin4-doc-9.2-1.1.s390x", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "pgadmin4-doc-9.2-1.1.x86_64 as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:pgadmin4-doc-9.2-1.1.x86_64" }, "product_reference": "pgadmin4-doc-9.2-1.1.x86_64", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "pgadmin4-web-uwsgi-9.2-1.1.aarch64 as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:pgadmin4-web-uwsgi-9.2-1.1.aarch64" }, "product_reference": "pgadmin4-web-uwsgi-9.2-1.1.aarch64", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "pgadmin4-web-uwsgi-9.2-1.1.ppc64le as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:pgadmin4-web-uwsgi-9.2-1.1.ppc64le" }, "product_reference": "pgadmin4-web-uwsgi-9.2-1.1.ppc64le", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "pgadmin4-web-uwsgi-9.2-1.1.s390x as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:pgadmin4-web-uwsgi-9.2-1.1.s390x" }, "product_reference": "pgadmin4-web-uwsgi-9.2-1.1.s390x", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "pgadmin4-web-uwsgi-9.2-1.1.x86_64 as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:pgadmin4-web-uwsgi-9.2-1.1.x86_64" }, "product_reference": "pgadmin4-web-uwsgi-9.2-1.1.x86_64", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "system-user-pgadmin-9.2-1.1.aarch64 as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:system-user-pgadmin-9.2-1.1.aarch64" }, "product_reference": "system-user-pgadmin-9.2-1.1.aarch64", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "system-user-pgadmin-9.2-1.1.ppc64le as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:system-user-pgadmin-9.2-1.1.ppc64le" }, "product_reference": "system-user-pgadmin-9.2-1.1.ppc64le", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "system-user-pgadmin-9.2-1.1.s390x as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:system-user-pgadmin-9.2-1.1.s390x" }, "product_reference": "system-user-pgadmin-9.2-1.1.s390x", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "system-user-pgadmin-9.2-1.1.x86_64 as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:system-user-pgadmin-9.2-1.1.x86_64" }, "product_reference": "system-user-pgadmin-9.2-1.1.x86_64", "relates_to_product_reference": "openSUSE Tumbleweed" } ] }, "vulnerabilities": [ { "cve": "CVE-2024-6238", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2024-6238" } ], "notes": [ { "category": "general", "text": "pgAdmin \u003c= 8.8 has an installation Directory permission issue. Because of this issue, attackers can gain unauthorised access to the installation directory on the Debian or RHEL 8 platforms.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:pgadmin4-9.2-1.1.aarch64", "openSUSE Tumbleweed:pgadmin4-9.2-1.1.ppc64le", "openSUSE Tumbleweed:pgadmin4-9.2-1.1.s390x", "openSUSE Tumbleweed:pgadmin4-9.2-1.1.x86_64", "openSUSE Tumbleweed:pgadmin4-cloud-9.2-1.1.aarch64", "openSUSE Tumbleweed:pgadmin4-cloud-9.2-1.1.ppc64le", "openSUSE Tumbleweed:pgadmin4-cloud-9.2-1.1.s390x", "openSUSE Tumbleweed:pgadmin4-cloud-9.2-1.1.x86_64", "openSUSE Tumbleweed:pgadmin4-desktop-9.2-1.1.aarch64", "openSUSE Tumbleweed:pgadmin4-desktop-9.2-1.1.ppc64le", "openSUSE Tumbleweed:pgadmin4-desktop-9.2-1.1.s390x", "openSUSE Tumbleweed:pgadmin4-desktop-9.2-1.1.x86_64", "openSUSE Tumbleweed:pgadmin4-doc-9.2-1.1.aarch64", "openSUSE Tumbleweed:pgadmin4-doc-9.2-1.1.ppc64le", "openSUSE Tumbleweed:pgadmin4-doc-9.2-1.1.s390x", "openSUSE Tumbleweed:pgadmin4-doc-9.2-1.1.x86_64", "openSUSE Tumbleweed:pgadmin4-web-uwsgi-9.2-1.1.aarch64", "openSUSE Tumbleweed:pgadmin4-web-uwsgi-9.2-1.1.ppc64le", "openSUSE Tumbleweed:pgadmin4-web-uwsgi-9.2-1.1.s390x", "openSUSE Tumbleweed:pgadmin4-web-uwsgi-9.2-1.1.x86_64", "openSUSE Tumbleweed:system-user-pgadmin-9.2-1.1.aarch64", "openSUSE Tumbleweed:system-user-pgadmin-9.2-1.1.ppc64le", "openSUSE Tumbleweed:system-user-pgadmin-9.2-1.1.s390x", "openSUSE Tumbleweed:system-user-pgadmin-9.2-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2024-6238", "url": "https://www.suse.com/security/cve/CVE-2024-6238" }, { "category": "external", "summary": "SUSE Bug 1227080 for CVE-2024-6238", "url": "https://bugzilla.suse.com/1227080" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:pgadmin4-9.2-1.1.aarch64", "openSUSE Tumbleweed:pgadmin4-9.2-1.1.ppc64le", "openSUSE Tumbleweed:pgadmin4-9.2-1.1.s390x", "openSUSE Tumbleweed:pgadmin4-9.2-1.1.x86_64", "openSUSE Tumbleweed:pgadmin4-cloud-9.2-1.1.aarch64", "openSUSE Tumbleweed:pgadmin4-cloud-9.2-1.1.ppc64le", "openSUSE Tumbleweed:pgadmin4-cloud-9.2-1.1.s390x", "openSUSE Tumbleweed:pgadmin4-cloud-9.2-1.1.x86_64", "openSUSE Tumbleweed:pgadmin4-desktop-9.2-1.1.aarch64", "openSUSE Tumbleweed:pgadmin4-desktop-9.2-1.1.ppc64le", "openSUSE Tumbleweed:pgadmin4-desktop-9.2-1.1.s390x", "openSUSE Tumbleweed:pgadmin4-desktop-9.2-1.1.x86_64", "openSUSE Tumbleweed:pgadmin4-doc-9.2-1.1.aarch64", "openSUSE Tumbleweed:pgadmin4-doc-9.2-1.1.ppc64le", "openSUSE Tumbleweed:pgadmin4-doc-9.2-1.1.s390x", "openSUSE Tumbleweed:pgadmin4-doc-9.2-1.1.x86_64", "openSUSE Tumbleweed:pgadmin4-web-uwsgi-9.2-1.1.aarch64", "openSUSE Tumbleweed:pgadmin4-web-uwsgi-9.2-1.1.ppc64le", "openSUSE Tumbleweed:pgadmin4-web-uwsgi-9.2-1.1.s390x", "openSUSE Tumbleweed:pgadmin4-web-uwsgi-9.2-1.1.x86_64", "openSUSE Tumbleweed:system-user-pgadmin-9.2-1.1.aarch64", "openSUSE Tumbleweed:system-user-pgadmin-9.2-1.1.ppc64le", "openSUSE Tumbleweed:system-user-pgadmin-9.2-1.1.s390x", "openSUSE Tumbleweed:system-user-pgadmin-9.2-1.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:pgadmin4-9.2-1.1.aarch64", "openSUSE Tumbleweed:pgadmin4-9.2-1.1.ppc64le", "openSUSE Tumbleweed:pgadmin4-9.2-1.1.s390x", "openSUSE Tumbleweed:pgadmin4-9.2-1.1.x86_64", "openSUSE Tumbleweed:pgadmin4-cloud-9.2-1.1.aarch64", "openSUSE Tumbleweed:pgadmin4-cloud-9.2-1.1.ppc64le", "openSUSE Tumbleweed:pgadmin4-cloud-9.2-1.1.s390x", "openSUSE Tumbleweed:pgadmin4-cloud-9.2-1.1.x86_64", "openSUSE Tumbleweed:pgadmin4-desktop-9.2-1.1.aarch64", "openSUSE Tumbleweed:pgadmin4-desktop-9.2-1.1.ppc64le", "openSUSE Tumbleweed:pgadmin4-desktop-9.2-1.1.s390x", "openSUSE Tumbleweed:pgadmin4-desktop-9.2-1.1.x86_64", "openSUSE Tumbleweed:pgadmin4-doc-9.2-1.1.aarch64", "openSUSE Tumbleweed:pgadmin4-doc-9.2-1.1.ppc64le", "openSUSE Tumbleweed:pgadmin4-doc-9.2-1.1.s390x", "openSUSE Tumbleweed:pgadmin4-doc-9.2-1.1.x86_64", "openSUSE Tumbleweed:pgadmin4-web-uwsgi-9.2-1.1.aarch64", "openSUSE Tumbleweed:pgadmin4-web-uwsgi-9.2-1.1.ppc64le", "openSUSE Tumbleweed:pgadmin4-web-uwsgi-9.2-1.1.s390x", "openSUSE Tumbleweed:pgadmin4-web-uwsgi-9.2-1.1.x86_64", "openSUSE Tumbleweed:system-user-pgadmin-9.2-1.1.aarch64", "openSUSE Tumbleweed:system-user-pgadmin-9.2-1.1.ppc64le", "openSUSE Tumbleweed:system-user-pgadmin-9.2-1.1.s390x", "openSUSE Tumbleweed:system-user-pgadmin-9.2-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2025-04-10T00:00:00Z", "details": "important" } ], "title": "CVE-2024-6238" }, { "cve": "CVE-2024-9014", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2024-9014" } ], "notes": [ { "category": "general", "text": "pgAdmin versions 8.11 and earlier are vulnerable to a security flaw in OAuth2 authentication. This vulnerability allows an attacker to potentially obtain the client ID and secret, leading to unauthorized access to user data.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:pgadmin4-9.2-1.1.aarch64", "openSUSE Tumbleweed:pgadmin4-9.2-1.1.ppc64le", "openSUSE Tumbleweed:pgadmin4-9.2-1.1.s390x", "openSUSE Tumbleweed:pgadmin4-9.2-1.1.x86_64", "openSUSE Tumbleweed:pgadmin4-cloud-9.2-1.1.aarch64", "openSUSE Tumbleweed:pgadmin4-cloud-9.2-1.1.ppc64le", "openSUSE Tumbleweed:pgadmin4-cloud-9.2-1.1.s390x", "openSUSE Tumbleweed:pgadmin4-cloud-9.2-1.1.x86_64", "openSUSE Tumbleweed:pgadmin4-desktop-9.2-1.1.aarch64", "openSUSE Tumbleweed:pgadmin4-desktop-9.2-1.1.ppc64le", "openSUSE Tumbleweed:pgadmin4-desktop-9.2-1.1.s390x", "openSUSE Tumbleweed:pgadmin4-desktop-9.2-1.1.x86_64", "openSUSE Tumbleweed:pgadmin4-doc-9.2-1.1.aarch64", "openSUSE Tumbleweed:pgadmin4-doc-9.2-1.1.ppc64le", "openSUSE Tumbleweed:pgadmin4-doc-9.2-1.1.s390x", "openSUSE Tumbleweed:pgadmin4-doc-9.2-1.1.x86_64", "openSUSE Tumbleweed:pgadmin4-web-uwsgi-9.2-1.1.aarch64", "openSUSE Tumbleweed:pgadmin4-web-uwsgi-9.2-1.1.ppc64le", "openSUSE Tumbleweed:pgadmin4-web-uwsgi-9.2-1.1.s390x", "openSUSE Tumbleweed:pgadmin4-web-uwsgi-9.2-1.1.x86_64", "openSUSE Tumbleweed:system-user-pgadmin-9.2-1.1.aarch64", "openSUSE Tumbleweed:system-user-pgadmin-9.2-1.1.ppc64le", "openSUSE Tumbleweed:system-user-pgadmin-9.2-1.1.s390x", "openSUSE Tumbleweed:system-user-pgadmin-9.2-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2024-9014", "url": "https://www.suse.com/security/cve/CVE-2024-9014" }, { "category": "external", "summary": "SUSE Bug 1230928 for CVE-2024-9014", "url": "https://bugzilla.suse.com/1230928" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:pgadmin4-9.2-1.1.aarch64", "openSUSE Tumbleweed:pgadmin4-9.2-1.1.ppc64le", "openSUSE Tumbleweed:pgadmin4-9.2-1.1.s390x", "openSUSE Tumbleweed:pgadmin4-9.2-1.1.x86_64", "openSUSE Tumbleweed:pgadmin4-cloud-9.2-1.1.aarch64", "openSUSE Tumbleweed:pgadmin4-cloud-9.2-1.1.ppc64le", "openSUSE Tumbleweed:pgadmin4-cloud-9.2-1.1.s390x", "openSUSE Tumbleweed:pgadmin4-cloud-9.2-1.1.x86_64", "openSUSE Tumbleweed:pgadmin4-desktop-9.2-1.1.aarch64", "openSUSE Tumbleweed:pgadmin4-desktop-9.2-1.1.ppc64le", "openSUSE Tumbleweed:pgadmin4-desktop-9.2-1.1.s390x", "openSUSE Tumbleweed:pgadmin4-desktop-9.2-1.1.x86_64", "openSUSE Tumbleweed:pgadmin4-doc-9.2-1.1.aarch64", "openSUSE Tumbleweed:pgadmin4-doc-9.2-1.1.ppc64le", "openSUSE Tumbleweed:pgadmin4-doc-9.2-1.1.s390x", "openSUSE Tumbleweed:pgadmin4-doc-9.2-1.1.x86_64", "openSUSE Tumbleweed:pgadmin4-web-uwsgi-9.2-1.1.aarch64", "openSUSE Tumbleweed:pgadmin4-web-uwsgi-9.2-1.1.ppc64le", "openSUSE Tumbleweed:pgadmin4-web-uwsgi-9.2-1.1.s390x", "openSUSE Tumbleweed:pgadmin4-web-uwsgi-9.2-1.1.x86_64", "openSUSE Tumbleweed:system-user-pgadmin-9.2-1.1.aarch64", "openSUSE Tumbleweed:system-user-pgadmin-9.2-1.1.ppc64le", "openSUSE Tumbleweed:system-user-pgadmin-9.2-1.1.s390x", "openSUSE Tumbleweed:system-user-pgadmin-9.2-1.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:pgadmin4-9.2-1.1.aarch64", "openSUSE Tumbleweed:pgadmin4-9.2-1.1.ppc64le", "openSUSE Tumbleweed:pgadmin4-9.2-1.1.s390x", "openSUSE Tumbleweed:pgadmin4-9.2-1.1.x86_64", "openSUSE Tumbleweed:pgadmin4-cloud-9.2-1.1.aarch64", "openSUSE Tumbleweed:pgadmin4-cloud-9.2-1.1.ppc64le", "openSUSE Tumbleweed:pgadmin4-cloud-9.2-1.1.s390x", "openSUSE Tumbleweed:pgadmin4-cloud-9.2-1.1.x86_64", "openSUSE Tumbleweed:pgadmin4-desktop-9.2-1.1.aarch64", "openSUSE Tumbleweed:pgadmin4-desktop-9.2-1.1.ppc64le", "openSUSE Tumbleweed:pgadmin4-desktop-9.2-1.1.s390x", "openSUSE Tumbleweed:pgadmin4-desktop-9.2-1.1.x86_64", "openSUSE Tumbleweed:pgadmin4-doc-9.2-1.1.aarch64", "openSUSE Tumbleweed:pgadmin4-doc-9.2-1.1.ppc64le", "openSUSE Tumbleweed:pgadmin4-doc-9.2-1.1.s390x", "openSUSE Tumbleweed:pgadmin4-doc-9.2-1.1.x86_64", "openSUSE Tumbleweed:pgadmin4-web-uwsgi-9.2-1.1.aarch64", "openSUSE Tumbleweed:pgadmin4-web-uwsgi-9.2-1.1.ppc64le", "openSUSE Tumbleweed:pgadmin4-web-uwsgi-9.2-1.1.s390x", "openSUSE Tumbleweed:pgadmin4-web-uwsgi-9.2-1.1.x86_64", "openSUSE Tumbleweed:system-user-pgadmin-9.2-1.1.aarch64", "openSUSE Tumbleweed:system-user-pgadmin-9.2-1.1.ppc64le", "openSUSE Tumbleweed:system-user-pgadmin-9.2-1.1.s390x", "openSUSE Tumbleweed:system-user-pgadmin-9.2-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2025-04-10T00:00:00Z", "details": "important" } ], "title": "CVE-2024-9014" }, { "cve": "CVE-2025-2945", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2025-2945" } ], "notes": [ { "category": "general", "text": "Remote Code Execution security vulnerability in pgAdmin 4 (Query Tool and Cloud Deployment modules).\n\nThe vulnerability is associated with the 2 POST endpoints; /sqleditor/query_tool/download, where the query_commited parameter and /cloud/deploy endpoint, where the high_availability parameter is unsafely passed to the Python eval() function, allowing arbitrary code execution.\n\n\nThis issue affects pgAdmin 4: before 9.2.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:pgadmin4-9.2-1.1.aarch64", "openSUSE Tumbleweed:pgadmin4-9.2-1.1.ppc64le", "openSUSE Tumbleweed:pgadmin4-9.2-1.1.s390x", "openSUSE Tumbleweed:pgadmin4-9.2-1.1.x86_64", "openSUSE Tumbleweed:pgadmin4-cloud-9.2-1.1.aarch64", "openSUSE Tumbleweed:pgadmin4-cloud-9.2-1.1.ppc64le", "openSUSE Tumbleweed:pgadmin4-cloud-9.2-1.1.s390x", "openSUSE Tumbleweed:pgadmin4-cloud-9.2-1.1.x86_64", "openSUSE Tumbleweed:pgadmin4-desktop-9.2-1.1.aarch64", "openSUSE Tumbleweed:pgadmin4-desktop-9.2-1.1.ppc64le", "openSUSE Tumbleweed:pgadmin4-desktop-9.2-1.1.s390x", "openSUSE Tumbleweed:pgadmin4-desktop-9.2-1.1.x86_64", "openSUSE Tumbleweed:pgadmin4-doc-9.2-1.1.aarch64", "openSUSE Tumbleweed:pgadmin4-doc-9.2-1.1.ppc64le", "openSUSE Tumbleweed:pgadmin4-doc-9.2-1.1.s390x", "openSUSE Tumbleweed:pgadmin4-doc-9.2-1.1.x86_64", "openSUSE Tumbleweed:pgadmin4-web-uwsgi-9.2-1.1.aarch64", "openSUSE Tumbleweed:pgadmin4-web-uwsgi-9.2-1.1.ppc64le", "openSUSE Tumbleweed:pgadmin4-web-uwsgi-9.2-1.1.s390x", "openSUSE Tumbleweed:pgadmin4-web-uwsgi-9.2-1.1.x86_64", "openSUSE Tumbleweed:system-user-pgadmin-9.2-1.1.aarch64", "openSUSE Tumbleweed:system-user-pgadmin-9.2-1.1.ppc64le", "openSUSE Tumbleweed:system-user-pgadmin-9.2-1.1.s390x", "openSUSE Tumbleweed:system-user-pgadmin-9.2-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2025-2945", "url": "https://www.suse.com/security/cve/CVE-2025-2945" }, { "category": "external", "summary": "SUSE Bug 1240746 for CVE-2025-2945", "url": "https://bugzilla.suse.com/1240746" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:pgadmin4-9.2-1.1.aarch64", "openSUSE Tumbleweed:pgadmin4-9.2-1.1.ppc64le", "openSUSE Tumbleweed:pgadmin4-9.2-1.1.s390x", "openSUSE Tumbleweed:pgadmin4-9.2-1.1.x86_64", "openSUSE Tumbleweed:pgadmin4-cloud-9.2-1.1.aarch64", "openSUSE Tumbleweed:pgadmin4-cloud-9.2-1.1.ppc64le", "openSUSE Tumbleweed:pgadmin4-cloud-9.2-1.1.s390x", "openSUSE Tumbleweed:pgadmin4-cloud-9.2-1.1.x86_64", "openSUSE Tumbleweed:pgadmin4-desktop-9.2-1.1.aarch64", "openSUSE Tumbleweed:pgadmin4-desktop-9.2-1.1.ppc64le", "openSUSE Tumbleweed:pgadmin4-desktop-9.2-1.1.s390x", "openSUSE Tumbleweed:pgadmin4-desktop-9.2-1.1.x86_64", "openSUSE Tumbleweed:pgadmin4-doc-9.2-1.1.aarch64", "openSUSE Tumbleweed:pgadmin4-doc-9.2-1.1.ppc64le", "openSUSE Tumbleweed:pgadmin4-doc-9.2-1.1.s390x", "openSUSE Tumbleweed:pgadmin4-doc-9.2-1.1.x86_64", "openSUSE Tumbleweed:pgadmin4-web-uwsgi-9.2-1.1.aarch64", "openSUSE Tumbleweed:pgadmin4-web-uwsgi-9.2-1.1.ppc64le", "openSUSE Tumbleweed:pgadmin4-web-uwsgi-9.2-1.1.s390x", "openSUSE Tumbleweed:pgadmin4-web-uwsgi-9.2-1.1.x86_64", "openSUSE Tumbleweed:system-user-pgadmin-9.2-1.1.aarch64", "openSUSE Tumbleweed:system-user-pgadmin-9.2-1.1.ppc64le", "openSUSE Tumbleweed:system-user-pgadmin-9.2-1.1.s390x", "openSUSE Tumbleweed:system-user-pgadmin-9.2-1.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 9.9, "baseSeverity": "CRITICAL", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:pgadmin4-9.2-1.1.aarch64", "openSUSE Tumbleweed:pgadmin4-9.2-1.1.ppc64le", "openSUSE Tumbleweed:pgadmin4-9.2-1.1.s390x", "openSUSE Tumbleweed:pgadmin4-9.2-1.1.x86_64", "openSUSE Tumbleweed:pgadmin4-cloud-9.2-1.1.aarch64", "openSUSE Tumbleweed:pgadmin4-cloud-9.2-1.1.ppc64le", "openSUSE Tumbleweed:pgadmin4-cloud-9.2-1.1.s390x", "openSUSE Tumbleweed:pgadmin4-cloud-9.2-1.1.x86_64", "openSUSE Tumbleweed:pgadmin4-desktop-9.2-1.1.aarch64", "openSUSE Tumbleweed:pgadmin4-desktop-9.2-1.1.ppc64le", "openSUSE Tumbleweed:pgadmin4-desktop-9.2-1.1.s390x", "openSUSE Tumbleweed:pgadmin4-desktop-9.2-1.1.x86_64", "openSUSE Tumbleweed:pgadmin4-doc-9.2-1.1.aarch64", "openSUSE Tumbleweed:pgadmin4-doc-9.2-1.1.ppc64le", "openSUSE Tumbleweed:pgadmin4-doc-9.2-1.1.s390x", "openSUSE Tumbleweed:pgadmin4-doc-9.2-1.1.x86_64", "openSUSE Tumbleweed:pgadmin4-web-uwsgi-9.2-1.1.aarch64", "openSUSE Tumbleweed:pgadmin4-web-uwsgi-9.2-1.1.ppc64le", "openSUSE Tumbleweed:pgadmin4-web-uwsgi-9.2-1.1.s390x", "openSUSE Tumbleweed:pgadmin4-web-uwsgi-9.2-1.1.x86_64", "openSUSE Tumbleweed:system-user-pgadmin-9.2-1.1.aarch64", "openSUSE Tumbleweed:system-user-pgadmin-9.2-1.1.ppc64le", "openSUSE Tumbleweed:system-user-pgadmin-9.2-1.1.s390x", "openSUSE Tumbleweed:system-user-pgadmin-9.2-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2025-04-10T00:00:00Z", "details": "critical" } ], "title": "CVE-2025-2945" }, { "cve": "CVE-2025-2946", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2025-2946" } ], "notes": [ { "category": "general", "text": "pgAdmin \u003c= 9.1 is affected by a security vulnerability with Cross-Site Scripting(XSS). If attackers execute any arbitrary HTML/JavaScript in a user\u0027s browser through query result rendering, then HTML/JavaScript runs on the browser.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:pgadmin4-9.2-1.1.aarch64", "openSUSE Tumbleweed:pgadmin4-9.2-1.1.ppc64le", "openSUSE Tumbleweed:pgadmin4-9.2-1.1.s390x", "openSUSE Tumbleweed:pgadmin4-9.2-1.1.x86_64", "openSUSE Tumbleweed:pgadmin4-cloud-9.2-1.1.aarch64", "openSUSE Tumbleweed:pgadmin4-cloud-9.2-1.1.ppc64le", "openSUSE Tumbleweed:pgadmin4-cloud-9.2-1.1.s390x", "openSUSE Tumbleweed:pgadmin4-cloud-9.2-1.1.x86_64", "openSUSE Tumbleweed:pgadmin4-desktop-9.2-1.1.aarch64", "openSUSE Tumbleweed:pgadmin4-desktop-9.2-1.1.ppc64le", "openSUSE Tumbleweed:pgadmin4-desktop-9.2-1.1.s390x", "openSUSE Tumbleweed:pgadmin4-desktop-9.2-1.1.x86_64", "openSUSE Tumbleweed:pgadmin4-doc-9.2-1.1.aarch64", "openSUSE Tumbleweed:pgadmin4-doc-9.2-1.1.ppc64le", "openSUSE Tumbleweed:pgadmin4-doc-9.2-1.1.s390x", "openSUSE Tumbleweed:pgadmin4-doc-9.2-1.1.x86_64", "openSUSE Tumbleweed:pgadmin4-web-uwsgi-9.2-1.1.aarch64", "openSUSE Tumbleweed:pgadmin4-web-uwsgi-9.2-1.1.ppc64le", "openSUSE Tumbleweed:pgadmin4-web-uwsgi-9.2-1.1.s390x", "openSUSE Tumbleweed:pgadmin4-web-uwsgi-9.2-1.1.x86_64", "openSUSE Tumbleweed:system-user-pgadmin-9.2-1.1.aarch64", "openSUSE Tumbleweed:system-user-pgadmin-9.2-1.1.ppc64le", "openSUSE Tumbleweed:system-user-pgadmin-9.2-1.1.s390x", "openSUSE Tumbleweed:system-user-pgadmin-9.2-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2025-2946", "url": "https://www.suse.com/security/cve/CVE-2025-2946" }, { "category": "external", "summary": "SUSE Bug 1240748 for CVE-2025-2946", "url": "https://bugzilla.suse.com/1240748" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:pgadmin4-9.2-1.1.aarch64", "openSUSE Tumbleweed:pgadmin4-9.2-1.1.ppc64le", "openSUSE Tumbleweed:pgadmin4-9.2-1.1.s390x", "openSUSE Tumbleweed:pgadmin4-9.2-1.1.x86_64", "openSUSE Tumbleweed:pgadmin4-cloud-9.2-1.1.aarch64", "openSUSE Tumbleweed:pgadmin4-cloud-9.2-1.1.ppc64le", "openSUSE Tumbleweed:pgadmin4-cloud-9.2-1.1.s390x", "openSUSE Tumbleweed:pgadmin4-cloud-9.2-1.1.x86_64", "openSUSE Tumbleweed:pgadmin4-desktop-9.2-1.1.aarch64", "openSUSE Tumbleweed:pgadmin4-desktop-9.2-1.1.ppc64le", "openSUSE Tumbleweed:pgadmin4-desktop-9.2-1.1.s390x", "openSUSE Tumbleweed:pgadmin4-desktop-9.2-1.1.x86_64", "openSUSE Tumbleweed:pgadmin4-doc-9.2-1.1.aarch64", "openSUSE Tumbleweed:pgadmin4-doc-9.2-1.1.ppc64le", "openSUSE Tumbleweed:pgadmin4-doc-9.2-1.1.s390x", "openSUSE Tumbleweed:pgadmin4-doc-9.2-1.1.x86_64", "openSUSE Tumbleweed:pgadmin4-web-uwsgi-9.2-1.1.aarch64", "openSUSE Tumbleweed:pgadmin4-web-uwsgi-9.2-1.1.ppc64le", "openSUSE Tumbleweed:pgadmin4-web-uwsgi-9.2-1.1.s390x", "openSUSE Tumbleweed:pgadmin4-web-uwsgi-9.2-1.1.x86_64", "openSUSE Tumbleweed:system-user-pgadmin-9.2-1.1.aarch64", "openSUSE Tumbleweed:system-user-pgadmin-9.2-1.1.ppc64le", "openSUSE Tumbleweed:system-user-pgadmin-9.2-1.1.s390x", "openSUSE Tumbleweed:system-user-pgadmin-9.2-1.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 9.1, "baseSeverity": "CRITICAL", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:L/I:L/A:H", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:pgadmin4-9.2-1.1.aarch64", "openSUSE Tumbleweed:pgadmin4-9.2-1.1.ppc64le", "openSUSE Tumbleweed:pgadmin4-9.2-1.1.s390x", "openSUSE Tumbleweed:pgadmin4-9.2-1.1.x86_64", "openSUSE Tumbleweed:pgadmin4-cloud-9.2-1.1.aarch64", "openSUSE Tumbleweed:pgadmin4-cloud-9.2-1.1.ppc64le", "openSUSE Tumbleweed:pgadmin4-cloud-9.2-1.1.s390x", "openSUSE Tumbleweed:pgadmin4-cloud-9.2-1.1.x86_64", "openSUSE Tumbleweed:pgadmin4-desktop-9.2-1.1.aarch64", "openSUSE Tumbleweed:pgadmin4-desktop-9.2-1.1.ppc64le", "openSUSE Tumbleweed:pgadmin4-desktop-9.2-1.1.s390x", "openSUSE Tumbleweed:pgadmin4-desktop-9.2-1.1.x86_64", "openSUSE Tumbleweed:pgadmin4-doc-9.2-1.1.aarch64", "openSUSE Tumbleweed:pgadmin4-doc-9.2-1.1.ppc64le", "openSUSE Tumbleweed:pgadmin4-doc-9.2-1.1.s390x", "openSUSE Tumbleweed:pgadmin4-doc-9.2-1.1.x86_64", "openSUSE Tumbleweed:pgadmin4-web-uwsgi-9.2-1.1.aarch64", "openSUSE Tumbleweed:pgadmin4-web-uwsgi-9.2-1.1.ppc64le", "openSUSE Tumbleweed:pgadmin4-web-uwsgi-9.2-1.1.s390x", "openSUSE Tumbleweed:pgadmin4-web-uwsgi-9.2-1.1.x86_64", "openSUSE Tumbleweed:system-user-pgadmin-9.2-1.1.aarch64", "openSUSE Tumbleweed:system-user-pgadmin-9.2-1.1.ppc64le", "openSUSE Tumbleweed:system-user-pgadmin-9.2-1.1.s390x", "openSUSE Tumbleweed:system-user-pgadmin-9.2-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2025-04-10T00:00:00Z", "details": "critical" } ], "title": "CVE-2025-2946" } ] }
ghsa-jm9x-rx9x-wpqj
Vulnerability from github
Published
2024-09-23 18:30
Modified
2024-10-01 20:35
Severity ?
VLAI Severity ?
Summary
OAuth2 client ID and secret exposed through the web browser
Details
pgAdmin versions 8.11 and earlier are vulnerable to a security flaw in OAuth2 authentication. This vulnerability allows an attacker to potentially obtain the client ID and secret, leading to unauthorized access to user data.
{ "affected": [ { "package": { "ecosystem": "PyPI", "name": "pgadmin4" }, "ranges": [ { "events": [ { "introduced": "0" }, { "fixed": "8.12" } ], "type": "ECOSYSTEM" } ] } ], "aliases": [ "CVE-2024-9014" ], "database_specific": { "cwe_ids": [ "CWE-522" ], "github_reviewed": true, "github_reviewed_at": "2024-10-01T20:35:10Z", "nvd_published_at": "2024-09-23T17:15:14Z", "severity": "HIGH" }, "details": "pgAdmin versions 8.11 and earlier are vulnerable to a security flaw in OAuth2 authentication. This vulnerability allows an attacker to potentially obtain the client ID and secret, leading to unauthorized access to user data.", "id": "GHSA-jm9x-rx9x-wpqj", "modified": "2024-10-01T20:35:10Z", "published": "2024-09-23T18:30:34Z", "references": [ { "type": "ADVISORY", "url": "https://nvd.nist.gov/vuln/detail/CVE-2024-9014" }, { "type": "WEB", "url": "https://github.com/pgadmin-org/pgadmin4/issues/7945" }, { "type": "PACKAGE", "url": "https://github.com/pgadmin-org/pgadmin4" }, { "type": "WEB", "url": "https://www.pgadmin.org/docs/pgadmin4/8.12/release_notes_8_12.html" } ], "schema_version": "1.4.0", "severity": [ { "score": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:N/A:N", "type": "CVSS_V3" } ], "summary": "OAuth2 client ID and secret exposed through the web browser" }
fkie_cve-2024-9014
Vulnerability from fkie_nvd
Published
2024-09-23 17:15
Modified
2024-09-26 13:32
Severity ?
Summary
pgAdmin versions 8.11 and earlier are vulnerable to a security flaw in OAuth2 authentication. This vulnerability allows an attacker to potentially obtain the client ID and secret, leading to unauthorized access to user data.
References
Impacted products
Vendor | Product | Version |
---|
{ "cveTags": [], "descriptions": [ { "lang": "en", "value": "pgAdmin versions 8.11 and earlier are vulnerable to a security flaw in OAuth2 authentication. This vulnerability allows an attacker to potentially obtain the client ID and secret, leading to unauthorized access to user data." }, { "lang": "es", "value": "Las versiones 8.11 y anteriores de pgAdmin son vulnerables a una falla de seguridad en la autenticaci\u00f3n OAuth2. Esta vulnerabilidad permite que un atacante obtenga potencialmente el ID y el secreto del cliente, lo que lleva a un acceso no autorizado a los datos del usuario." } ], "id": "CVE-2024-9014", "lastModified": "2024-09-26T13:32:55.343", "metrics": { "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 9.9, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "CHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H", "version": "3.1" }, "exploitabilityScore": 3.1, "impactScore": 6.0, "source": "f86ef6dc-4d3a-42ad-8f28-e6d5547a5007", "type": "Secondary" } ] }, "published": "2024-09-23T17:15:14.000", "references": [ { "source": "f86ef6dc-4d3a-42ad-8f28-e6d5547a5007", "url": "https://github.com/pgadmin-org/pgadmin4/issues/7945" } ], "sourceIdentifier": "f86ef6dc-4d3a-42ad-8f28-e6d5547a5007", "vulnStatus": "Awaiting Analysis", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-522" } ], "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "type": "Secondary" } ] }
wid-sec-w-2024-2199
Vulnerability from csaf_certbund
Published
2024-09-23 22:00
Modified
2025-04-13 22:00
Summary
pgAdmin: Schwachstelle ermöglicht Privilegieneskalation
Notes
Das BSI ist als Anbieter für die eigenen, zur Nutzung bereitgestellten Inhalte nach den allgemeinen Gesetzen verantwortlich. Nutzerinnen und Nutzer sind jedoch dafür verantwortlich, die Verwendung und/oder die Umsetzung der mit den Inhalten bereitgestellten Informationen sorgfältig im Einzelfall zu prüfen.
Produktbeschreibung
pgAdmin ist eine Verwaltungs- und Entwicklungsplattform für die PostgreSQL-Datenbank.
Angriff
Ein entfernter, authentisierter Angreifer kann eine Schwachstelle in pgAdmin ausnutzen, um seine Privilegien zu erhöhen.
Betroffene Betriebssysteme
- Linux
- Windows
{ "document": { "aggregate_severity": { "text": "hoch" }, "category": "csaf_base", "csaf_version": "2.0", "distribution": { "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "de-DE", "notes": [ { "category": "legal_disclaimer", "text": "Das BSI ist als Anbieter f\u00fcr die eigenen, zur Nutzung bereitgestellten Inhalte nach den allgemeinen Gesetzen verantwortlich. Nutzerinnen und Nutzer sind jedoch daf\u00fcr verantwortlich, die Verwendung und/oder die Umsetzung der mit den Inhalten bereitgestellten Informationen sorgf\u00e4ltig im Einzelfall zu pr\u00fcfen." }, { "category": "description", "text": "pgAdmin ist eine Verwaltungs- und Entwicklungsplattform f\u00fcr die PostgreSQL-Datenbank.", "title": "Produktbeschreibung" }, { "category": "summary", "text": "Ein entfernter, authentisierter Angreifer kann eine Schwachstelle in pgAdmin ausnutzen, um seine Privilegien zu erh\u00f6hen.", "title": "Angriff" }, { "category": "general", "text": "- Linux\n- Windows", "title": "Betroffene Betriebssysteme" } ], "publisher": { "category": "other", "contact_details": "csaf-provider@cert-bund.de", "name": "Bundesamt f\u00fcr Sicherheit in der Informationstechnik", "namespace": "https://www.bsi.bund.de" }, "references": [ { "category": "self", "summary": "WID-SEC-W-2024-2199 - CSAF Version", "url": "https://wid.cert-bund.de/.well-known/csaf/white/2024/wid-sec-w-2024-2199.json" }, { "category": "self", "summary": "WID-SEC-2024-2199 - Portal Version", "url": "https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2024-2199" }, { "category": "external", "summary": "pgAdmin Release Notes vom 2024-09-23", "url": "https://www.pgadmin.org/docs/pgadmin4/8.12/release_notes_8_12.html" }, { "category": "external", "summary": "Red Hat Bugtracker vom 2024-09-23", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2314259" }, { "category": "external", "summary": "Fedora Security Advisory FEDORA-2024-4944AD2C87 vom 2024-09-25", "url": "https://bodhi.fedoraproject.org/updates/FEDORA-2024-4944ad2c87" }, { "category": "external", "summary": "Fedora Security Advisory FEDORA-2024-126D22C121 vom 2024-09-25", "url": "https://bodhi.fedoraproject.org/updates/FEDORA-2024-126d22c121" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2024:3771-1 vom 2024-10-29", "url": "https://lists.suse.com/pipermail/sle-security-updates/2024-October/019689.html" }, { "category": "external", "summary": "openSUSE Security Update OPENSUSE-SU-2025:14983-1 vom 2025-04-11", "url": "https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/message/BYON52PV4P44MGBG55FDOG2SP2G266ZO/" } ], "source_lang": "en-US", "title": "pgAdmin: Schwachstelle erm\u00f6glicht Privilegieneskalation", "tracking": { "current_release_date": "2025-04-13T22:00:00.000+00:00", "generator": { "date": "2025-04-14T08:17:28.058+00:00", "engine": { "name": "BSI-WID", "version": "1.3.12" } }, "id": "WID-SEC-W-2024-2199", "initial_release_date": "2024-09-23T22:00:00.000+00:00", "revision_history": [ { "date": "2024-09-23T22:00:00.000+00:00", "number": "1", "summary": "Initiale Fassung" }, { "date": "2024-09-25T22:00:00.000+00:00", "number": "2", "summary": "Neue Updates von Fedora aufgenommen" }, { "date": "2024-10-29T23:00:00.000+00:00", "number": "3", "summary": "Neue Updates von SUSE aufgenommen" }, { "date": "2025-04-13T22:00:00.000+00:00", "number": "4", "summary": "Neue Updates von openSUSE aufgenommen" } ], "status": "final", "version": "4" } }, "product_tree": { "branches": [ { "branches": [ { "category": "product_name", "name": "Fedora Linux", "product": { "name": "Fedora Linux", "product_id": "74185", "product_identification_helper": { "cpe": "cpe:/o:fedoraproject:fedora:-" } } } ], "category": "vendor", "name": "Fedora" }, { "branches": [ { "branches": [ { "category": "product_version_range", "name": "\u003c8.12", "product": { "name": "Open Source pgAdmin \u003c8.12", "product_id": "T037781" } }, { "category": "product_version", "name": "8.12", "product": { "name": "Open Source pgAdmin 8.12", "product_id": "T037781-fixed", "product_identification_helper": { "cpe": "cpe:/a:pgadmin:pgadmin:8.12" } } } ], "category": "product_name", "name": "pgAdmin" } ], "category": "vendor", "name": "Open Source" }, { "branches": [ { "category": "product_name", "name": "SUSE Linux", "product": { "name": "SUSE Linux", "product_id": "T002207", "product_identification_helper": { "cpe": "cpe:/o:suse:suse_linux:-" } } }, { "category": "product_name", "name": "SUSE openSUSE", "product": { "name": "SUSE openSUSE", "product_id": "T027843", "product_identification_helper": { "cpe": "cpe:/o:suse:opensuse:-" } } } ], "category": "vendor", "name": "SUSE" } ] }, "vulnerabilities": [ { "cve": "CVE-2024-9014", "product_status": { "known_affected": [ "T002207", "T027843", "T037781", "74185" ] }, "release_date": "2024-09-23T22:00:00.000+00:00", "title": "CVE-2024-9014" } ] }
ncsc-2024-0380
Vulnerability from csaf_ncscnl
Published
2024-09-24 06:36
Modified
2024-09-24 07:31
Summary
Kwetsbaarheid verholpen in pgAdmin
Notes
The Netherlands Cyber Security Center (henceforth: NCSC-NL) maintains this page to enhance access to its information and security advisories. The use of this security advisory is subject to the following terms and conditions:
NCSC-NL makes every reasonable effort to ensure that the content of this page is kept up to date, and that it is accurate and complete. Nevertheless, NCSC-NL cannot entirely rule out the possibility of errors, and therefore cannot give any warranty in respect of its completeness, accuracy or continuous keeping up-to-date. The information contained in this security advisory is intended solely for the purpose of providing general information to professional users. No rights can be derived from the information provided therein.
NCSC-NL and the Kingdom of the Netherlands assume no legal liability or responsibility for any damage resulting from either the use or inability of use of this security advisory. This includes damage resulting from the inaccuracy of incompleteness of the information contained in the advisory.
This security advisory is subject to Dutch law. All disputes related to or arising from the use of this advisory will be submitted to the competent court in The Hague. This choice of means also applies to the court in summary proceedings.
Feiten
pgAdmin heeft een kwetsbaarheid verholpen in pgAdmin 8.11.
Interpretaties
Een kwaadwillende kan de kwetsbaarheid misbruiken om toegang te krijgen tot gevoelige gegevens.
Oplossingen
pgAdmin heeft een update uitgebracht om de kwetsbaarheid te verhelpen. Zie bijgevoegde referenties voor meer informatie.
Kans
medium
Schade
high
CWE-522
Insufficiently Protected Credentials
{ "document": { "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "tlp": { "label": "WHITE" } }, "lang": "nl", "notes": [ { "category": "legal_disclaimer", "text": "The Netherlands Cyber Security Center (henceforth: NCSC-NL) maintains this page to enhance access to its information and security advisories. The use of this security advisory is subject to the following terms and conditions:\n\n NCSC-NL makes every reasonable effort to ensure that the content of this page is kept up to date, and that it is accurate and complete. Nevertheless, NCSC-NL cannot entirely rule out the possibility of errors, and therefore cannot give any warranty in respect of its completeness, accuracy or continuous keeping up-to-date. The information contained in this security advisory is intended solely for the purpose of providing general information to professional users. No rights can be derived from the information provided therein.\n\n NCSC-NL and the Kingdom of the Netherlands assume no legal liability or responsibility for any damage resulting from either the use or inability of use of this security advisory. This includes damage resulting from the inaccuracy of incompleteness of the information contained in the advisory.\n This security advisory is subject to Dutch law. All disputes related to or arising from the use of this advisory will be submitted to the competent court in The Hague. This choice of means also applies to the court in summary proceedings." }, { "category": "description", "text": "pgAdmin heeft een kwetsbaarheid verholpen in pgAdmin 8.11.", "title": "Feiten" }, { "category": "description", "text": "Een kwaadwillende kan de kwetsbaarheid misbruiken om toegang te krijgen tot gevoelige gegevens.", "title": "Interpretaties" }, { "category": "description", "text": "pgAdmin heeft een update uitgebracht om de kwetsbaarheid te verhelpen. Zie bijgevoegde referenties voor meer informatie.", "title": "Oplossingen" }, { "category": "general", "text": "medium", "title": "Kans" }, { "category": "general", "text": "high", "title": "Schade" }, { "category": "general", "text": "Insufficiently Protected Credentials", "title": "CWE-522" } ], "publisher": { "category": "coordinator", "contact_details": "cert@ncsc.nl", "name": "Nationaal Cyber Security Centrum", "namespace": "https://www.ncsc.nl/" }, "references": [ { "category": "external", "summary": "Source - cveprojectv5", "url": "https://www.cve.org/CVERecord?id=CVE-2024-9014" }, { "category": "external", "summary": "Reference - cveprojectv5; nvd", "url": "https://github.com/pgadmin-org/pgadmin4/issues/7945" } ], "title": "Kwetsbaarheid verholpen in pgAdmin", "tracking": { "current_release_date": "2024-09-24T07:31:32.768856Z", "id": "NCSC-2024-0380", "initial_release_date": "2024-09-24T06:36:30.438686Z", "revision_history": [ { "date": "2024-09-24T06:36:30.438686Z", "number": "0", "summary": "Initiele versie" }, { "date": "2024-09-24T07:31:32.768856Z", "number": "1", "summary": "New revision" } ], "status": "final", "version": "1.0.1" } }, "product_tree": { "branches": [ { "branches": [ { "category": "product_name", "name": "pgadmin_4", "product": { "name": "pgadmin_4", "product_id": "CSAFPID-1472208", "product_identification_helper": { "cpe": "cpe:2.3:a:pgadmin.org:pgadmin_4:0:*:*:*:*:*:*:*" } } } ], "category": "vendor", "name": "pgadmin.org" } ] }, "vulnerabilities": [ { "cve": "CVE-2024-9014", "product_status": { "known_affected": [ "CSAFPID-1472208" ] }, "references": [ { "category": "self", "summary": "CVE-2024-9014", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-9014.json" } ], "scores": [ { "cvss_v3": { "baseScore": 9.9, "baseSeverity": "CRITICAL", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H", "version": "3.1" }, "products": [ "CSAFPID-1472208" ] } ], "title": "CVE-2024-9014" } ] }
Loading…
Loading…
Sightings
Author | Source | Type | Date |
---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
- Confirmed: The vulnerability is confirmed from an analyst perspective.
- Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
- Patched: This vulnerability was successfully patched by the user reporting the sighting.
- Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
- Not confirmed: The user expresses doubt about the veracity of the vulnerability.
- Not patched: This vulnerability was not successfully patched by the user reporting the sighting.
Loading…
Loading…