File 0001-Unsafe-Deserialization-and-Remote-Code-Execution-by-an.patch of Package pgadmin4.35897
From 4e49d752fba72953acceeb7f4aa2e6e32d25853d Mon Sep 17 00:00:00 2001
From: Akshay Joshi <akshay.joshi@enterprisedb.com>
Date: Mon, 4 Mar 2024 13:22:09 +0530
Subject: [PATCH] Unsafe Deserialization and Remote Code Execution by an
Authenticated user in pgAdmin 4 (CVE-2024-2044).
---
docs/en_US/release_notes_8_4.rst | 1 +
web/pgadmin/utils/session.py | 29 +++++++++++++++++++----------
2 files changed, 20 insertions(+), 10 deletions(-)
#diff --git a/docs/en_US/release_notes_8_4.rst b/docs/en_US/release_notes_8_4.rst
#index d2510142b7..036b799971 100644
#--- a/docs/en_US/release_notes_8_4.rst
#+++ b/docs/en_US/release_notes_8_4.rst
#@@ -43,3 +43,4 @@ Bug fixes
# | `Issue #7193 <https://github.com/pgadmin-org/pgadmin4/issues/7193>`_ - Ensure that the OAuth2 session is logged out when users log out from pgAdmin.
# | `Issue #7217 <https://github.com/pgadmin-org/pgadmin4/issues/7217>`_ - Remove role related checks on the UI dashboard when terminating session/query and let PostgreSQL take care of it.
# | `Issue #7225 <https://github.com/pgadmin-org/pgadmin4/issues/7225>`_ - Fix an issue where type column in dependents/dependencies tab is not showing correct label.
#+ | `Issue #7258 <https://github.com/pgadmin-org/pgadmin4/issues/7258>`_ - Unsafe Deserialization and Remote Code Execution by an Authenticated user in pgAdmin 4 (CVE-2024-2044).
#\ No newline at end of file
diff --git a/web/pgadmin/utils/session.py b/web/pgadmin/utils/session.py
index 090c9e062f..ebbddbd4c9 100644
--- a/web/pgadmin/utils/session.py
+++ b/web/pgadmin/utils/session.py
@@ -34,6 +34,8 @@
from flask.sessions import SessionInterface, SessionMixin
from werkzeug.datastructures import CallbackDict
+from werkzeug.security import safe_join
+from werkzeug.exceptions import InternalServerError
from pgadmin.utils.ajax import make_json_response
@@ -192,27 +194,30 @@ def __init__(self, path, secret, disk_write_delay, skip_paths=None):
self.skip_paths = [] if skip_paths is None else skip_paths
def exists(self, sid):
- fname = os.path.join(self.path, sid)
- return os.path.exists(fname)
+ fname = safe_join(self.path, sid)
+ return fname is not None and os.path.exists(fname)
def remove(self, sid):
- fname = os.path.join(self.path, sid)
- if os.path.exists(fname):
+ fname = safe_join(self.path, sid)
+ if fname is not None and os.path.exists(fname):
os.unlink(fname)
def new_session(self):
sid = str(uuid4())
- fname = os.path.join(self.path, sid)
+ fname = safe_join(self.path, sid)
- while os.path.exists(fname):
+ while fname is not None and os.path.exists(fname):
sid = str(uuid4())
- fname = os.path.join(self.path, sid)
+ fname = safe_join(self.path, sid)
# Do not store the session if skip paths
for sp in self.skip_paths:
if request.path.startswith(sp):
return ManagedSession(sid=sid)
+ if fname is None:
+ raise InternalServerError('Failed to create new session')
+
# touch the file
with open(fname, 'wb'):
return ManagedSession(sid=sid)
@@ -222,12 +227,12 @@ def new_session(self):
def get(self, sid, digest):
'Retrieve a managed session by session-id, checking the HMAC digest'
- fname = os.path.join(self.path, sid)
+ fname = safe_join(self.path, sid)
data = None
hmac_digest = None
randval = None
- if os.path.exists(fname):
+ if fname is not None and os.path.exists(fname):
try:
with open(fname, 'rb') as f:
randval, hmac_digest, data = load(f)
@@ -266,7 +271,11 @@ def put(self, session):
if request.path.startswith(sp):
return
- fname = os.path.join(self.path, session.sid)
+ fname = safe_join(self.path, session.sid)
+
+ if fname is None:
+ raise InternalServerError('Failed to update the session')
+
with open(fname, 'wb') as f:
dump(
(session.randval, session.hmac_digest, dict(session)),