When batch jobs are executed by pgAgent, a script is created in a temporary directory and then executed. In versions of pgAgent prior to 4.2.3, an insufficiently seeded random number generator is used when generating the directory name, leading to the possibility for a local attacker to pre-create the directory and thus prevent pgAgent from executing jobs, disrupting scheduled tasks.
References
Configurations
History
11 Feb 2025, 21:11
Type | Values Removed | Values Added |
---|---|---|
CWE | CWE-330 | |
References | () https://github.com/pgadmin-org/pgagent/commit/1ecd193a2be3a3dc9e98f369495e1a792e6d508c - Patch | |
Summary |
|
|
CPE | cpe:2.3:a:pgadmin:pgagent:*:*:*:*:*:postgresql:*:* | |
First Time |
Pgadmin
Pgadmin pgagent |
07 Jan 2025, 20:15
Type | Values Removed | Values Added |
---|---|---|
New CVE |
Information
Published : 2025-01-07 20:15
Updated : 2025-02-11 21:11
NVD link : CVE-2025-0218
Mitre link : CVE-2025-0218
CVE.ORG link : CVE-2025-0218
JSON object : View
Products Affected
pgadmin
- pgagent