Goal Reached Thanks to every supporter — we hit 100%!

Goal: 1000 CNY · Raised: 1000 CNY

100.0%

CVE-2022-4223

EPSS 87.79% · P99
Get alerts for future matching vulnerabilitiesLog in to subscribe

I. Basic Information for CVE-2022-4223

Vulnerability Information

Have questions about the vulnerability? See if Shenlong's analysis helps!
View Shenlong Deep Dive ↗

Although we use advanced large model technology, its output may still contain inaccurate or outdated information.Shenlong tries to ensure data accuracy, but please verify and judge based on the actual situation.

Vulnerability Title
N/A
Source: NVD (National Vulnerability Database)
Vulnerability Description
The pgAdmin server includes an HTTP API that is intended to be used to validate the path a user selects to external PostgreSQL utilities such as pg_dump and pg_restore. The utility is executed by the server to determine what PostgreSQL version it is from. Versions of pgAdmin prior to 6.17 failed to properly secure this API, which could allow an unauthenticated user to call it with a path of their choosing, such as a UNC path to a server they control on a Windows machine. This would cause an appropriately named executable in the target path to be executed by the pgAdmin server.
Source: NVD (National Vulnerability Database)
CVSS Information
N/A
Source: NVD (National Vulnerability Database)
Vulnerability Type
对生成代码的控制不恰当(代码注入)
Source: NVD (National Vulnerability Database)
Vulnerability Title
pgAdmin 代码注入漏洞
Source: CNNVD (China National Vulnerability Database)
Vulnerability Description
pgAdmin是一个用于开源数据库 PostgreSQL 的开源管理和开发平台。 pgAdmin 6.17之前版本存在代码注入漏洞,该漏洞源于无法正确保护HTTP API,这可能允许未经身份验证的用户使用他们选择的路径调用它,例如他们在 Windows 机器上控制的服务器的 UNC 路径,这将导致 pgAdmin 服务器执行目标路径中适当命名的可执行文件。
Source: CNNVD (China National Vulnerability Database)
CVSS Information
N/A
Source: CNNVD (China National Vulnerability Database)
Vulnerability Type
N/A
Source: CNNVD (China National Vulnerability Database)

Shenlong Deep Dive — AI Deep Analysis

10-question deep dive: root cause, exploitation, mitigation, urgency. Read summary free, full version requires login.

Affected Products

VendorProductAffected VersionsCPESubscribe
-pgadmin4 pgadmin4 6.17 -

II. Public POCs for CVE-2022-4223

#POC DescriptionSource LinkShenlong Link
1Nonehttps://github.com/Threekiii/Awesome-POC/blob/master/Web%E5%BA%94%E7%94%A8%E6%BC%8F%E6%B4%9E/pgAdmin%20%E2%89%A4%206.16%20%E6%97%A0%E6%8E%88%E6%9D%83%E8%BF%9C%E7%A8%8B%E5%91%BD%E4%BB%A4%E6%89%A7%E8%A1%8C%E6%BC%8F%E6%B4%9E%20CVE-2022-4223.mdPOC Details
2https://github.com/vulhub/vulhub/blob/master/pgadmin/CVE-2022-4223/README.mdPOC Details
3pgAdmin prior to 6.17 contains an insecure HTTP API caused by improper access control, letting unauthenticated users execute arbitrary external utilities via path manipulation, exploit requires no authentication. https://github.com/projectdiscovery/nuclei-templates/blob/main/http/cves/2022/CVE-2022-4223.yamlPOC Details
AI-Generated POCPremium

No public POC found.

Login to generate AI POC

III. Intelligence Information for CVE-2022-4223

登录查看更多情报信息。

Same Patch Batch · n/a · 2022-12-13 · 71 CVEs total

CVE-2022-464049.8 CRITICALAtos Unify OpenScape 4000 命令注入漏洞
CVE-2022-458714.3 MEDIUMDenial-of-Service (DoS) Vulnerability
CVE-2022-42139Delta Electronics DVW-W02W2-E2 操作系统命令注入漏洞
CVE-2022-46061AeroCMS 安全漏洞
CVE-2022-45005IP-COM EW9 操作系统命令注入漏洞
CVE-2022-44874wasm3 缓冲区错误漏洞
CVE-2022-44636SAMSUNG TV 安全漏洞
CVE-2022-44303Resque Scheduler 跨站脚本漏洞
CVE-2022-43996csaf_distribution 跨站脚本漏洞
CVE-2022-42141Delta Electronics DX-2100RW-WW 跨站脚本漏洞
CVE-2022-42140Delta Electronics DX-2100RW-WW 操作系统命令注入漏洞
CVE-2022-45685Jettison 缓冲区错误漏洞
CVE-2022-38628Nortek Control Linear eMerge E3-Series 授权问题漏洞
CVE-2022-37155SPIP 安全漏洞
CVE-2022-31699VMware ESXi 缓冲区错误漏洞
CVE-2022-31698VMware ESXi和vCenter Server 安全漏洞
CVE-2022-31697VMware ESXi和vCenter Server 信息泄露漏洞
CVE-2022-31696VMware ESXi和vCenter Server 缓冲区错误漏洞
CVE-2022-27581SICK RFU61x 加密问题漏洞
CVE-2022-20611Google Pixel 安全漏洞

Showing top 20 of 71 CVEs. View all on vendor page → →

IV. Related Vulnerabilities

V. Comments for CVE-2022-4223

No comments yet


Leave a comment