pgAdmin 4 OAuth2 Authentication Bypass Vulnerability
漏洞信息
漏洞名称: pgAdmin 4 OAuth2 Authentication Bypass Vulnerability
漏洞编号:
- CVE: CVE-2024-9014
漏洞类型: 权限绕过
漏洞等级: 高危
漏洞描述: pgAdmin 4是一款流行的开源数据库管理工具,广泛用于PostgreSQL数据库的管理和操作。它提供了一个用户友好的界面,支持多种数据库操作功能,是企业级数据库管理的常用工具之一。该漏洞存在于pgAdmin 4的OAuth2认证机制中,允许攻击者绕过认证流程,直接访问敏感资源。漏洞的技术根源在于OAuth2配置的不当暴露,使得攻击者能够利用这些配置信息绕过正常的认证过程。这种漏洞的存在可能导致未经授权的访问,攻击者可以获取敏感数据或执行未授权的操作,严重威胁到数据库的安全性和完整性。由于pgAdmin 4的广泛使用,此漏洞的影响范围较大,需要管理员及时采取措施进行修复。
产品厂商: pgAdmin
产品名称: pgAdmin 4
来源: https://github.com/r0otk3r/CVE-2024-9014
类型: CVE-2024:github search
仓库文件
- README.md
来源概述
CVE-2024-9014 - pgAdmin 4 OAuth2 Authentication Bypass Exploit Tools
This repository contains tools to check for and exploit the CVE-2024-9014 vulnerability in pgAdmin 4. The vulnerability allows an attacker to bypass OAuth2 authentication and access sensitive resources.
Tools
1. cve_2024_9014_check.py
This script checks if a target system is vulnerable to CVE-2024-9014 by examining its pgAdmin 4 installation and looking for exposed OAuth2 configurations.
Usage
1 |
|
–url: Single target URL to check (e.g., http://example.com/).
–list: File containing a list of target URLs -(one per line).
–output: File to save the results.
–proxy: Optional proxy (e.g., http://127.0.0.
Example
1 |
|
The script will check if the target is running pgAdmin 4 and whether it is vulnerable. Vulnerable targets will have exposed OAuth2 configuration.
Output
2. extract_oauth2_config.py
This script extracts the OAuth2 configuration from a pgAdmin 4 installation. It helps identify whether sensitive OAuth2 credentials are exposed in the HTML source.
1 |
|
The script will save the extracted OAuth2 configuration for vulnerable targets in a specified output file.
Output
Requirements
- Python 3.x
- requests library (pip install requests)
⚠️ Disclaimer
This script is intended for authorized security testing and educational purposes only. Ensure you have permission to test the systems you’re targeting. Unauthorized access or exploitation of systems is illegal.
License
This project is licensed under the MIT License - see the LICENSE file for details.