SUSE-SU-2025:01326-1

Vulnerability from csaf_suse - Published: 2025-08-14 13:03 - Updated: 2025-08-14 13:03
Summary
Security update for pgadmin4

Notes

Title of the patch
Security update for pgadmin4
Description of the patch
This update for pgadmin4 fixes the following issues: - CVE-2025-27152: Fixed SSRF and creadential leakage due to requests sent to absolute URL even when baseURL is set (bsc#1239308) - CVE-2023-1907: Fixed an issue which could result in users being authenticated in another user's session if two users authenticate simultaneously via ldap (bsc#1234840) - CVE-2024-4068: Fixed a possible memory exhaustion (bsc#1224295)
Patchnames
SUSE-2025-1326,SUSE-SLE-Module-Python3-15-SP6-2025-1326
Terms of use
CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).

{
  "document": {
    "aggregate_severity": {
      "namespace": "https://www.suse.com/support/security/rating/",
      "text": "important"
    },
    "category": "csaf_security_advisory",
    "csaf_version": "2.0",
    "distribution": {
      "text": "Copyright 2024 SUSE LLC. All rights reserved.",
      "tlp": {
        "label": "WHITE",
        "url": "https://www.first.org/tlp/"
      }
    },
    "lang": "en",
    "notes": [
      {
        "category": "summary",
        "text": "Security update for pgadmin4",
        "title": "Title of the patch"
      },
      {
        "category": "description",
        "text": "This update for pgadmin4 fixes the following issues:\n\n- CVE-2025-27152: Fixed SSRF and creadential leakage due to requests sent to absolute URL even when baseURL is set (bsc#1239308)\n- CVE-2023-1907: Fixed an issue which could result in users being authenticated in another user\u0027s session if two users authenticate simultaneously via ldap (bsc#1234840)\n- CVE-2024-4068: Fixed a possible memory exhaustion (bsc#1224295)\n",
        "title": "Description of the patch"
      },
      {
        "category": "details",
        "text": "SUSE-2025-1326,SUSE-SLE-Module-Python3-15-SP6-2025-1326",
        "title": "Patchnames"
      },
      {
        "category": "legal_disclaimer",
        "text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).",
        "title": "Terms of use"
      }
    ],
    "publisher": {
      "category": "vendor",
      "contact_details": "https://www.suse.com/support/security/contact/",
      "name": "SUSE Product Security Team",
      "namespace": "https://www.suse.com/"
    },
    "references": [
      {
        "category": "external",
        "summary": "SUSE ratings",
        "url": "https://www.suse.com/support/security/rating/"
      },
      {
        "category": "self",
        "summary": "URL of this CSAF notice",
        "url": "https://ftp.suse.com/pub/projects/security/csaf/suse-su-2025_01326-1.json"
      },
      {
        "category": "self",
        "summary": "URL for SUSE-SU-2025:01326-1",
        "url": "https://www.suse.com/support/update/announcement/2025/suse-su-202501326-1/"
      },
      {
        "category": "self",
        "summary": "E-Mail link for SUSE-SU-2025:01326-1",
        "url": "https://lists.suse.com/pipermail/sle-updates/2025-August/041215.html"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1224295",
        "url": "https://bugzilla.suse.com/1224295"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1234840",
        "url": "https://bugzilla.suse.com/1234840"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1239308",
        "url": "https://bugzilla.suse.com/1239308"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2023-1907 page",
        "url": "https://www.suse.com/security/cve/CVE-2023-1907/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2024-4068 page",
        "url": "https://www.suse.com/security/cve/CVE-2024-4068/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2025-27152 page",
        "url": "https://www.suse.com/security/cve/CVE-2025-27152/"
      }
    ],
    "title": "Security update for pgadmin4",
    "tracking": {
      "current_release_date": "2025-08-14T13:03:13Z",
      "generator": {
        "date": "2025-08-14T13:03:13Z",
        "engine": {
          "name": "cve-database.git:bin/generate-csaf.pl",
          "version": "1"
        }
      },
      "id": "SUSE-SU-2025:01326-1",
      "initial_release_date": "2025-08-14T13:03:13Z",
      "revision_history": [
        {
          "date": "2025-08-14T13:03:13Z",
          "number": "1",
          "summary": "Current version"
        }
      ],
      "status": "final",
      "version": "1"
    }
  },
  "product_tree": {
    "branches": [
      {
        "branches": [
          {
            "branches": [
              {
                "category": "product_version",
                "name": "pgadmin4-4.30-150300.3.18.1.aarch64",
                "product": {
                  "name": "pgadmin4-4.30-150300.3.18.1.aarch64",
                  "product_id": "pgadmin4-4.30-150300.3.18.1.aarch64"
                }
              }
            ],
            "category": "architecture",
            "name": "aarch64"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "pgadmin4-4.30-150300.3.18.1.i586",
                "product": {
                  "name": "pgadmin4-4.30-150300.3.18.1.i586",
                  "product_id": "pgadmin4-4.30-150300.3.18.1.i586"
                }
              }
            ],
            "category": "architecture",
            "name": "i586"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "pgadmin4-doc-4.30-150300.3.18.1.noarch",
                "product": {
                  "name": "pgadmin4-doc-4.30-150300.3.18.1.noarch",
                  "product_id": "pgadmin4-doc-4.30-150300.3.18.1.noarch"
                }
              },
              {
                "category": "product_version",
                "name": "pgadmin4-web-4.30-150300.3.18.1.noarch",
                "product": {
                  "name": "pgadmin4-web-4.30-150300.3.18.1.noarch",
                  "product_id": "pgadmin4-web-4.30-150300.3.18.1.noarch"
                }
              },
              {
                "category": "product_version",
                "name": "pgadmin4-web-uwsgi-4.30-150300.3.18.1.noarch",
                "product": {
                  "name": "pgadmin4-web-uwsgi-4.30-150300.3.18.1.noarch",
                  "product_id": "pgadmin4-web-uwsgi-4.30-150300.3.18.1.noarch"
                }
              }
            ],
            "category": "architecture",
            "name": "noarch"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "pgadmin4-4.30-150300.3.18.1.ppc64le",
                "product": {
                  "name": "pgadmin4-4.30-150300.3.18.1.ppc64le",
                  "product_id": "pgadmin4-4.30-150300.3.18.1.ppc64le"
                }
              }
            ],
            "category": "architecture",
            "name": "ppc64le"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "pgadmin4-4.30-150300.3.18.1.s390x",
                "product": {
                  "name": "pgadmin4-4.30-150300.3.18.1.s390x",
                  "product_id": "pgadmin4-4.30-150300.3.18.1.s390x"
                }
              }
            ],
            "category": "architecture",
            "name": "s390x"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "pgadmin4-4.30-150300.3.18.1.x86_64",
                "product": {
                  "name": "pgadmin4-4.30-150300.3.18.1.x86_64",
                  "product_id": "pgadmin4-4.30-150300.3.18.1.x86_64"
                }
              }
            ],
            "category": "architecture",
            "name": "x86_64"
          },
          {
            "branches": [
              {
                "category": "product_name",
                "name": "SUSE Linux Enterprise Module for Python 3 15 SP6",
                "product": {
                  "name": "SUSE Linux Enterprise Module for Python 3 15 SP6",
                  "product_id": "SUSE Linux Enterprise Module for Python 3 15 SP6",
                  "product_identification_helper": {
                    "cpe": "cpe:/o:suse:sle-module-python3:15:sp6"
                  }
                }
              }
            ],
            "category": "product_family",
            "name": "SUSE Linux Enterprise"
          }
        ],
        "category": "vendor",
        "name": "SUSE"
      }
    ],
    "relationships": [
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "pgadmin4-4.30-150300.3.18.1.s390x as component of SUSE Linux Enterprise Module for Python 3 15 SP6",
          "product_id": "SUSE Linux Enterprise Module for Python 3 15 SP6:pgadmin4-4.30-150300.3.18.1.s390x"
        },
        "product_reference": "pgadmin4-4.30-150300.3.18.1.s390x",
        "relates_to_product_reference": "SUSE Linux Enterprise Module for Python 3 15 SP6"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "pgadmin4-doc-4.30-150300.3.18.1.noarch as component of SUSE Linux Enterprise Module for Python 3 15 SP6",
          "product_id": "SUSE Linux Enterprise Module for Python 3 15 SP6:pgadmin4-doc-4.30-150300.3.18.1.noarch"
        },
        "product_reference": "pgadmin4-doc-4.30-150300.3.18.1.noarch",
        "relates_to_product_reference": "SUSE Linux Enterprise Module for Python 3 15 SP6"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "pgadmin4-web-4.30-150300.3.18.1.noarch as component of SUSE Linux Enterprise Module for Python 3 15 SP6",
          "product_id": "SUSE Linux Enterprise Module for Python 3 15 SP6:pgadmin4-web-4.30-150300.3.18.1.noarch"
        },
        "product_reference": "pgadmin4-web-4.30-150300.3.18.1.noarch",
        "relates_to_product_reference": "SUSE Linux Enterprise Module for Python 3 15 SP6"
      }
    ]
  },
  "vulnerabilities": [
    {
      "cve": "CVE-2023-1907",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2023-1907"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "A vulnerability was found in pgadmin. Users logging into pgAdmin running in server mode using LDAP authentication may be attached to another user\u0027s session if multiple connection attempts occur simultaneously.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise Module for Python 3 15 SP6:pgadmin4-4.30-150300.3.18.1.s390x",
          "SUSE Linux Enterprise Module for Python 3 15 SP6:pgadmin4-doc-4.30-150300.3.18.1.noarch",
          "SUSE Linux Enterprise Module for Python 3 15 SP6:pgadmin4-web-4.30-150300.3.18.1.noarch"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2023-1907",
          "url": "https://www.suse.com/security/cve/CVE-2023-1907"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1234840 for CVE-2023-1907",
          "url": "https://bugzilla.suse.com/1234840"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise Module for Python 3 15 SP6:pgadmin4-4.30-150300.3.18.1.s390x",
            "SUSE Linux Enterprise Module for Python 3 15 SP6:pgadmin4-doc-4.30-150300.3.18.1.noarch",
            "SUSE Linux Enterprise Module for Python 3 15 SP6:pgadmin4-web-4.30-150300.3.18.1.noarch"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 7.1,
            "baseSeverity": "HIGH",
            "vectorString": "CVSS:3.1/AV:N/AC:H/PR:L/UI:R/S:U/C:H/I:H/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise Module for Python 3 15 SP6:pgadmin4-4.30-150300.3.18.1.s390x",
            "SUSE Linux Enterprise Module for Python 3 15 SP6:pgadmin4-doc-4.30-150300.3.18.1.noarch",
            "SUSE Linux Enterprise Module for Python 3 15 SP6:pgadmin4-web-4.30-150300.3.18.1.noarch"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2025-08-14T13:03:13Z",
          "details": "important"
        }
      ],
      "title": "CVE-2023-1907"
    },
    {
      "cve": "CVE-2024-4068",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2024-4068"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "The NPM package `braces`, versions prior to 3.0.3, fails to limit the number of characters it can handle, which could lead to Memory Exhaustion. In `lib/parse.js,` if a malicious user sends \"imbalanced braces\" as input, the parsing will enter a loop, which will cause the program to start allocating heap memory without freeing it at any moment of the loop. Eventually, the JavaScript heap limit is reached, and the program will crash.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise Module for Python 3 15 SP6:pgadmin4-4.30-150300.3.18.1.s390x",
          "SUSE Linux Enterprise Module for Python 3 15 SP6:pgadmin4-doc-4.30-150300.3.18.1.noarch",
          "SUSE Linux Enterprise Module for Python 3 15 SP6:pgadmin4-web-4.30-150300.3.18.1.noarch"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2024-4068",
          "url": "https://www.suse.com/security/cve/CVE-2024-4068"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1224256 for CVE-2024-4068",
          "url": "https://bugzilla.suse.com/1224256"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise Module for Python 3 15 SP6:pgadmin4-4.30-150300.3.18.1.s390x",
            "SUSE Linux Enterprise Module for Python 3 15 SP6:pgadmin4-doc-4.30-150300.3.18.1.noarch",
            "SUSE Linux Enterprise Module for Python 3 15 SP6:pgadmin4-web-4.30-150300.3.18.1.noarch"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 7.5,
            "baseSeverity": "HIGH",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise Module for Python 3 15 SP6:pgadmin4-4.30-150300.3.18.1.s390x",
            "SUSE Linux Enterprise Module for Python 3 15 SP6:pgadmin4-doc-4.30-150300.3.18.1.noarch",
            "SUSE Linux Enterprise Module for Python 3 15 SP6:pgadmin4-web-4.30-150300.3.18.1.noarch"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2025-08-14T13:03:13Z",
          "details": "important"
        }
      ],
      "title": "CVE-2024-4068"
    },
    {
      "cve": "CVE-2025-27152",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2025-27152"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "axios is a promise based HTTP client for the browser and node.js. The issue occurs when passing absolute URLs rather than protocol-relative URLs to axios. Even if \u2060baseURL is set, axios sends the request to the specified absolute URL, potentially causing SSRF and credential leakage. This issue impacts both server-side and client-side usage of axios. This issue is fixed in 1.8.2.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise Module for Python 3 15 SP6:pgadmin4-4.30-150300.3.18.1.s390x",
          "SUSE Linux Enterprise Module for Python 3 15 SP6:pgadmin4-doc-4.30-150300.3.18.1.noarch",
          "SUSE Linux Enterprise Module for Python 3 15 SP6:pgadmin4-web-4.30-150300.3.18.1.noarch"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2025-27152",
          "url": "https://www.suse.com/security/cve/CVE-2025-27152"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1239305 for CVE-2025-27152",
          "url": "https://bugzilla.suse.com/1239305"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise Module for Python 3 15 SP6:pgadmin4-4.30-150300.3.18.1.s390x",
            "SUSE Linux Enterprise Module for Python 3 15 SP6:pgadmin4-doc-4.30-150300.3.18.1.noarch",
            "SUSE Linux Enterprise Module for Python 3 15 SP6:pgadmin4-web-4.30-150300.3.18.1.noarch"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 7.5,
            "baseSeverity": "HIGH",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise Module for Python 3 15 SP6:pgadmin4-4.30-150300.3.18.1.s390x",
            "SUSE Linux Enterprise Module for Python 3 15 SP6:pgadmin4-doc-4.30-150300.3.18.1.noarch",
            "SUSE Linux Enterprise Module for Python 3 15 SP6:pgadmin4-web-4.30-150300.3.18.1.noarch"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2025-08-14T13:03:13Z",
          "details": "important"
        }
      ],
      "title": "CVE-2025-27152"
    }
  ]
}


Log in or create an account to share your comment.




Tags
Taxonomy of the tags.


Loading…

Loading…

Loading…

Sightings

Author Source Type Date

Nomenclature

  • Seen: The vulnerability was mentioned, discussed, or observed by the user.
  • Confirmed: The vulnerability has been validated from an analyst's perspective.
  • Published Proof of Concept: A public proof of concept is available for this vulnerability.
  • Exploited: The vulnerability was observed as exploited by the user who reported the sighting.
  • Patched: The vulnerability was observed as successfully patched by the user who reported the sighting.
  • Not exploited: The vulnerability was not observed as exploited by the user who reported the sighting.
  • Not confirmed: The user expressed doubt about the validity of the vulnerability.
  • Not patched: The vulnerability was not observed as successfully patched by the user who reported the sighting.


Loading…

Detection rules are retrieved from Rulezet.

Loading…

Loading…