MGASA-2022-0257

Source
https://advisories.mageia.org/MGASA-2022-0257.html
Import Source
https://advisories.mageia.org/MGASA-2022-0257.json
JSON Data
https://api.osv.dev/v1/vulns/MGASA-2022-0257
Related
Published
2022-07-13T20:44:07Z
Modified
2022-07-13T19:52:20Z
Summary
Updated pgadmin4 packages fix security vulnerability
Details

A malicious, but authorised and authenticated user can construct an HTTP request using their existing CSRF token and session cookie to manually upload files to any location that the operating system user account under which pgAdmin is running has permission to write. (CVE-2022-0959)

In addition, missing requires have been added, file and directory permissions have been corrected. Upstream update check disabled.

References
Credits

Affected packages

Mageia:8 / pgadmin4

Package

Name
pgadmin4
Purl
pkg:rpm/mageia/pgadmin4?arch=source&distro=mageia-8

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
4.30-5.mga8

Ecosystem specific

{
    "section": "core"
}