pgAdmin 4 OAuth2 Authentication Bypass Vulnerability

漏洞信息

漏洞名称: pgAdmin 4 OAuth2 Authentication Bypass Vulnerability

漏洞编号:

  • CVE: CVE-2024-9014

漏洞类型: 权限绕过

漏洞等级: 高危

漏洞描述: pgAdmin 4是一款流行的开源数据库管理工具,广泛用于PostgreSQL数据库的管理和操作。它提供了一个用户友好的界面,支持多种数据库操作功能,是企业级数据库管理的常用工具之一。该漏洞存在于pgAdmin 4的OAuth2认证机制中,允许攻击者绕过认证流程,直接访问敏感资源。漏洞的技术根源在于OAuth2配置的不当暴露,使得攻击者能够利用这些配置信息绕过正常的认证过程。这种漏洞的存在可能导致未经授权的访问,攻击者可以获取敏感数据或执行未授权的操作,严重威胁到数据库的安全性和完整性。由于pgAdmin 4的广泛使用,此漏洞的影响范围较大,需要管理员及时采取措施进行修复。

产品厂商: pgAdmin

产品名称: pgAdmin 4

来源: https://github.com/r0otk3r/CVE-2024-9014

类型: CVE-2024:github search

仓库文件

  • README.md

来源概述

CVE-2024-9014 - pgAdmin 4 OAuth2 Authentication Bypass Exploit Tools

This repository contains tools to check for and exploit the CVE-2024-9014 vulnerability in pgAdmin 4. The vulnerability allows an attacker to bypass OAuth2 authentication and access sensitive resources.

Tools

1. cve_2024_9014_check.py

This script checks if a target system is vulnerable to CVE-2024-9014 by examining its pgAdmin 4 installation and looking for exposed OAuth2 configurations.

Usage
1
python3 cve_2024_9014_check.py --url <target_url> [--proxy <proxy_url>] [--output <output_file>]
  • –url: Single target URL to check (e.g., http://example.com/).

  • –list: File containing a list of target URLs -(one per line).

  • –output: File to save the results.

  • –proxy: Optional proxy (e.g., http://127.0.0.

Example
1
python3 cve_2024_9014_check.py --url <target_url> --proxy http://127.0.0.1:8080 --output results.txt

The script will check if the target is running pgAdmin 4 and whether it is vulnerable. Vulnerable targets will have exposed OAuth2 configuration.

Output

1


2. extract_oauth2_config.py

This script extracts the OAuth2 configuration from a pgAdmin 4 installation. It helps identify whether sensitive OAuth2 credentials are exposed in the HTML source.

1
python3 extract_oauth2_config.py -u <target_url> [--proxy <proxy_url>] [--output <output_file>]

The script will save the extracted OAuth2 configuration for vulnerable targets in a specified output file.

Output

2


Requirements

  • Python 3.x
  • requests library (pip install requests)

⚠️ Disclaimer

This script is intended for authorized security testing and educational purposes only. Ensure you have permission to test the systems you’re targeting. Unauthorized access or exploitation of systems is illegal.

License

This project is licensed under the MIT License - see the LICENSE file for details.


pgAdmin 4 OAuth2 Authentication Bypass Vulnerability
http://example.com/2025/07/08/github_3737565673/
作者
lianccc
发布于
2025年7月8日
许可协议