vulnerability
phpMyAdmin: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') (CVE-2020-10802)
| Severity | CVSS | Published | Added | Modified |
|---|---|---|---|---|
| 6 | (AV:N/AC:M/Au:S/C:P/I:P/A:P) | Mar 22, 2020 | Mar 25, 2020 | Nov 8, 2023 |
Severity
6
CVSS
(AV:N/AC:M/Au:S/C:P/I:P/A:P)
Published
Mar 22, 2020
Added
Mar 25, 2020
Modified
Nov 8, 2023
Description
In phpMyAdmin 4.x before 4.9.5 and 5.x before 5.0.2, a SQL injection vulnerability has been discovered where certain parameters are not properly escaped when generating certain queries for search actions in libraries/classes/Controllers/Table/TableSearchController.php. An attacker can generate a crafted database or table name. The attack can be performed if a user attempts certain search operations on the malicious database or table.
Solutions
phpmyadmin-upgrade-4_9_5phpmyadmin-upgrade-5_0_2
References
- CVE-2020-10802
- https://attackerkb.com/topics/CVE-2020-10802
- URL-http://lists.opensuse.org/opensuse-security-announce/2020-03/msg00046.html
- URL-http://lists.opensuse.org/opensuse-security-announce/2020-03/msg00050.html
- URL-http://lists.opensuse.org/opensuse-security-announce/2020-11/msg00005.html
- URL-https://lists.debian.org/debian-lts-announce/2020/03/msg00028.html
- URL-https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/AAVW3SUKWR5RF5LZ6SARCYOWBIFUIWOJ/
- URL-https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/BUG3IRITW2LUBGR5LSQMP7MVRTELHZJK/
- URL-https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/UZI6EQVRRIG252DY3MBT33BJVCSYDMQO/
- URL-https://www.phpmyadmin.net/security/PMASA-2020-3/
NEW
Explore Exposure Command
Confidently identify and prioritize exposures from endpoint to cloud with full attack surface visibility and threat-aware risk context.