Goal Reached Thanks to every supporter — we hit 100%!

Goal: 1000 CNY · Raised: 1000 CNY

100.0%

CVE-2022-4223 PoC — pgAdmin 代码注入漏洞

Source
Associated Vulnerability
Title:pgAdmin 代码注入漏洞 (CVE-2022-4223)
Description:pgAdmin是一个用于开源数据库 PostgreSQL 的开源管理和开发平台。 pgAdmin 6.17之前版本存在代码注入漏洞,该漏洞源于无法正确保护HTTP API,这可能允许未经身份验证的用户使用他们选择的路径调用它,例如他们在 Windows 机器上控制的服务器的 UNC 路径,这将导致 pgAdmin 服务器执行目标路径中适当命名的可执行文件。
Description
pgAdmin prior to 6.17 contains an insecure HTTP API caused by improper access control, letting unauthenticated users execute arbitrary external utilities via path manipulation, exploit requires no authentication.
File Snapshot

id: CVE-2022-4223 info: name: pgAdmin < 6.17 - Unauthenticated Remote Code Execution author: 0x ...
Shenlong Bot has cached this for you
Remarks
    1. It is advised to access via the original source first.
    2. If the original source is unavailable, please email f.jinxu#gmail.com for a local snapshot (replace # with @).
    3. Shenlong has snapshotted the POC code for you. To support long-term maintenance, please consider donating. Thank you for your support.