id: CVE-2024-9014 info: name: pgAdmin 4 - Authentication Bypass author: s4e-io severity: critical description: | pgAdmin 4 versions 8.11 and earlier are vulnerable to a security flaw in OAuth2 authentication. This vulnerability allows an attacker to potentially obtain the client ID and secret, leading to unauthorized access to user data. reference: - https://github.com/EQSTLab/CVE-2024-9014 - https://github.com/pgadmin-org/pgadmin4/issues/7945 - https://nvd.nist.gov/vuln/detail/CVE-2024-9014 classification: cvss-metrics: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H cvss-score: 9.9 cve-id: CVE-2024-9014 cwe-id: CWE-522 epss-score: 0.00043 epss-percentile: 0.09595 metadata: verified: true max-request: 1 vendor: pgadmin-org product: pgadmin4 fofa-query: "pgadmin4" tags: cve,cve2024,pgadmin,exposure,auth-bypass http: - raw: - | GET /login?next=/ HTTP/1.1 Host: {{Hostname}} matchers-condition: and matchers: - type: regex part: body negative: true regex: - 'OAUTH2_CLIENT_SECRET": null' - type: word part: body words: - 'pgAdmin 4' - 'OAUTH2_CLIENT_SECRET' condition: and - type: status status: - 200 # digest: 4b0a004830460221009c2ded269bf8e0dbb07418a79cf9f4af8cebfd7f1780bd5fe9f2d155058f7b68022100ea82fa3dfa85ff37352e5a7867378ef47e10b5c49290c84ef60e19709a6506b0:922c64590222798bb761d5b6d8e72950