ALT-PU-2020-3212-1
Package phpMyAdmin updated to version 5.0.4-alt1 for branch p9 in task 260652.
Closed vulnerabilities
BDU:2019-04000
Уязвимость веб-приложения для администрирования систем управления базами данных phpMyAdmin, связанная с подделкой межсайтовых запросов, позволяющая нарушителю удалить любой сервер на странице установки
BDU:2020-03949
Уязвимость функции конструктора (designer/move.js file) веб-приложения для администрирования систем управления базами данных phpMyAdmin, позволяющая нарушителю выполнить произвольный код
BDU:2021-01804
Уязвимость функции «Export» веб-приложения для администрирования систем управления базами данных phpMyAdmin, позволяющая нарушителю выполнить произвольный код
Modified: 2024-11-21
CVE-2019-11768
An issue was discovered in phpMyAdmin before 4.9.0.1. A vulnerability was reported where a specially crafted database name can be used to trigger an SQL injection attack through the designer feature.
Modified: 2024-11-21
CVE-2019-12616
An issue was discovered in phpMyAdmin before 4.9.0. A vulnerability was found that allows an attacker to trigger a CSRF attack against a phpMyAdmin user. The attacker can trick the user, for instance through a broken tag pointing at the victim's phpMyAdmin database, and the attacker can potentially deliver a payload (such as a specific INSERT or DELETE statement) to the victim.
- openSUSE-SU-2019:1689
- openSUSE-SU-2019:1689
- openSUSE-SU-2019:1861
- openSUSE-SU-2019:1861
- http://packetstormsecurity.com/files/153251/phpMyAdmin-4.8-Cross-Site-Request-Forgery.html
- http://packetstormsecurity.com/files/153251/phpMyAdmin-4.8-Cross-Site-Request-Forgery.html
- 108619
- 108619
- [debian-lts-announce] 20190617 [SECURITY] [DLA 1821-1] phpmyadmin security update
- [debian-lts-announce] 20190617 [SECURITY] [DLA 1821-1] phpmyadmin security update
- FEDORA-2019-13d2ba0aed
- FEDORA-2019-13d2ba0aed
- FEDORA-2019-33649e2e64
- FEDORA-2019-33649e2e64
- https://www.phpmyadmin.net/security/
- https://www.phpmyadmin.net/security/
- https://www.phpmyadmin.net/security/PMASA-2019-4/
- https://www.phpmyadmin.net/security/PMASA-2019-4/
Modified: 2024-11-21
CVE-2019-12922
A CSRF issue in phpMyAdmin 4.9.0.1 allows deletion of any server in the Setup page.
- openSUSE-SU-2019:2211
- openSUSE-SU-2019:2211
- openSUSE-SU-2020:0056
- openSUSE-SU-2020:0056
- http://packetstormsecurity.com/files/154483/phpMyAdmin-4.9.0.1-Cross-Site-Request-Forgery.html
- http://packetstormsecurity.com/files/154483/phpMyAdmin-4.9.0.1-Cross-Site-Request-Forgery.html
- http://seclists.org/fulldisclosure/2019/Sep/23
- http://seclists.org/fulldisclosure/2019/Sep/23
- https://github.com/phpmyadmin/phpmyadmin/commit/427fbed55d3154d96ecfc1c7784d49eaa3c04161
- https://github.com/phpmyadmin/phpmyadmin/commit/427fbed55d3154d96ecfc1c7784d49eaa3c04161
- https://github.com/phpmyadmin/phpmyadmin/commit/7d21d4223bdbe0306593309132b4263d7087d13b
- https://github.com/phpmyadmin/phpmyadmin/commit/7d21d4223bdbe0306593309132b4263d7087d13b
- FEDORA-2019-644b438f51
- FEDORA-2019-644b438f51
- FEDORA-2019-6404181bf9
- FEDORA-2019-6404181bf9
- FEDORA-2019-3b5a7abe17
- FEDORA-2019-3b5a7abe17
- Exploit Database
- Exploit Database
Modified: 2024-11-21
CVE-2019-18622
An issue was discovered in phpMyAdmin before 4.9.2. A crafted database/table name can be used to trigger a SQL injection attack through the designer feature.
- openSUSE-SU-2019:2599
- openSUSE-SU-2019:2599
- openSUSE-SU-2020:0056
- openSUSE-SU-2020:0056
- FEDORA-2019-8f55b515f1
- FEDORA-2019-8f55b515f1
- FEDORA-2019-db68ae1fca
- FEDORA-2019-db68ae1fca
- GLSA-202003-39
- GLSA-202003-39
- https://www.phpmyadmin.net/security/PMASA-2019-5/
- https://www.phpmyadmin.net/security/PMASA-2019-5/
Modified: 2024-11-21
CVE-2019-19617
phpMyAdmin before 4.9.2 does not escape certain Git information, related to libraries/classes/Display/GitRevision.php and libraries/classes/Footer.php.
- https://github.com/phpmyadmin/phpmyadmin/commit/1119de642b136d20e810bb20f545069a01dd7cc9
- https://github.com/phpmyadmin/phpmyadmin/commit/1119de642b136d20e810bb20f545069a01dd7cc9
- https://github.com/phpmyadmin/phpmyadmin/compare/RELEASE_4_9_1...RELEASE_4_9_2
- https://github.com/phpmyadmin/phpmyadmin/compare/RELEASE_4_9_1...RELEASE_4_9_2
- [debian-lts-announce] 20191208 [SECURITY] [DLA 2024-1] phpmyadmin security update
- [debian-lts-announce] 20191208 [SECURITY] [DLA 2024-1] phpmyadmin security update
- [debian-lts-announce] 20201025 [SECURITY] [DLA 2413-1] phpmyadmin security update
- [debian-lts-announce] 20201025 [SECURITY] [DLA 2413-1] phpmyadmin security update
- https://www.phpmyadmin.net/news/2019/11/22/phpmyadmin-492-released/
- https://www.phpmyadmin.net/news/2019/11/22/phpmyadmin-492-released/
Modified: 2024-11-21
CVE-2020-10802
In phpMyAdmin 4.x before 4.9.5 and 5.x before 5.0.2, a SQL injection vulnerability has been discovered where certain parameters are not properly escaped when generating certain queries for search actions in libraries/classes/Controllers/Table/TableSearchController.php. An attacker can generate a crafted database or table name. The attack can be performed if a user attempts certain search operations on the malicious database or table.
- openSUSE-SU-2020:0405
- openSUSE-SU-2020:0427
- openSUSE-SU-2020:1806
- [debian-lts-announce] 20200322 [SECURITY] [DLA 2154-1] phpmyadmin security update
- FEDORA-2020-25f3aea389
- FEDORA-2020-e60ce63865
- FEDORA-2020-d7b0a5a84a
- https://www.phpmyadmin.net/security/PMASA-2020-3/
- openSUSE-SU-2020:0405
- https://www.phpmyadmin.net/security/PMASA-2020-3/
- FEDORA-2020-d7b0a5a84a
- FEDORA-2020-e60ce63865
- FEDORA-2020-25f3aea389
- [debian-lts-announce] 20200322 [SECURITY] [DLA 2154-1] phpmyadmin security update
- openSUSE-SU-2020:1806
- openSUSE-SU-2020:0427
Modified: 2024-11-21
CVE-2020-10803
In phpMyAdmin 4.x before 4.9.5 and 5.x before 5.0.2, a SQL injection vulnerability was discovered where malicious code could be used to trigger an XSS attack through retrieving and displaying results (in tbl_get_field.php and libraries/classes/Display/Results.php). The attacker must be able to insert crafted data into certain database tables, which when retrieved (for instance, through the Browse tab) can trigger the XSS attack.
- openSUSE-SU-2020:0405
- openSUSE-SU-2020:0427
- openSUSE-SU-2020:1806
- [debian-lts-announce] 20200322 [SECURITY] [DLA 2154-1] phpmyadmin security update
- FEDORA-2020-25f3aea389
- FEDORA-2020-e60ce63865
- FEDORA-2020-d7b0a5a84a
- https://www.phpmyadmin.net/security/PMASA-2020-4/
- openSUSE-SU-2020:0405
- https://www.phpmyadmin.net/security/PMASA-2020-4/
- FEDORA-2020-d7b0a5a84a
- FEDORA-2020-e60ce63865
- FEDORA-2020-25f3aea389
- [debian-lts-announce] 20200322 [SECURITY] [DLA 2154-1] phpmyadmin security update
- openSUSE-SU-2020:1806
- openSUSE-SU-2020:0427
Modified: 2024-11-21
CVE-2020-10804
In phpMyAdmin 4.x before 4.9.5 and 5.x before 5.0.2, a SQL injection vulnerability was found in retrieval of the current username (in libraries/classes/Server/Privileges.php and libraries/classes/UserPassword.php). A malicious user with access to the server could create a crafted username, and then trick the victim into performing specific actions with that user account (such as editing its privileges).
- openSUSE-SU-2020:0405
- openSUSE-SU-2020:0427
- openSUSE-SU-2020:1806
- FEDORA-2020-25f3aea389
- FEDORA-2020-e60ce63865
- FEDORA-2020-d7b0a5a84a
- https://www.phpmyadmin.net/security/PMASA-2020-2/
- openSUSE-SU-2020:0405
- https://www.phpmyadmin.net/security/PMASA-2020-2/
- FEDORA-2020-d7b0a5a84a
- FEDORA-2020-e60ce63865
- FEDORA-2020-25f3aea389
- openSUSE-SU-2020:1806
- openSUSE-SU-2020:0427
Modified: 2024-11-21
CVE-2020-22278
phpMyAdmin through 5.0.2 allows CSV injection via Export Section. NOTE: the vendor disputes this because "the CSV file is accurately generated based on the database contents.
- https://cert.ikiu.ac.ir/public-files/news/document/CVE-99/CVE-2020-22278.pdf
- https://cert.ikiu.ac.ir/public-files/news/document/CVE-99/CVE-2020-22278.pdf
- https://mega.nz/file/ySQnlQSR#vXzY46mgf0CE2ysYpWpbE4O6T_g37--rtaL8pqdHcQs
- https://mega.nz/file/ySQnlQSR#vXzY46mgf0CE2ysYpWpbE4O6T_g37--rtaL8pqdHcQs
Modified: 2024-11-21
CVE-2020-5504
In phpMyAdmin 4 before 4.9.4 and 5 before 5.0.1, SQL injection exists in the user accounts page. A malicious user could inject custom SQL in place of their own username when creating queries to this page. An attacker must have a valid MySQL account to access the server.
- openSUSE-SU-2020:0056
- openSUSE-SU-2020:0056
- https://cybersecurityworks.com/zerodays/cve-2020-5504-phpmyadmin.html
- https://cybersecurityworks.com/zerodays/cve-2020-5504-phpmyadmin.html
- [debian-lts-announce] 20200115 [SECURITY] [DLA 2060-1] phpmyadmin security update
- [debian-lts-announce] 20200115 [SECURITY] [DLA 2060-1] phpmyadmin security update
- https://www.phpmyadmin.net/security/PMASA-2020-1/
- https://www.phpmyadmin.net/security/PMASA-2020-1/
Closed bugs
Too short initial value for 'blowfish_secret' parameter