vulnerability
phpMyAdmin: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') (CVE-2020-10803)
| Severity | CVSS | Published | Added | Modified |
|---|---|---|---|---|
| 4 | (AV:N/AC:M/Au:S/C:N/I:P/A:N) | Mar 22, 2020 | Mar 25, 2020 | Nov 8, 2023 |
Severity
4
CVSS
(AV:N/AC:M/Au:S/C:N/I:P/A:N)
Published
Mar 22, 2020
Added
Mar 25, 2020
Modified
Nov 8, 2023
Description
In phpMyAdmin 4.x before 4.9.5 and 5.x before 5.0.2, a SQL injection vulnerability was discovered where malicious code could be used to trigger an XSS attack through retrieving and displaying results (in tbl_get_field.php and libraries/classes/Display/Results.php). The attacker must be able to insert crafted data into certain database tables, which when retrieved (for instance, through the Browse tab) can trigger the XSS attack.
Solutions
phpmyadmin-upgrade-4_9_5phpmyadmin-upgrade-5_0_2
References
- CVE-2020-10803
- https://attackerkb.com/topics/CVE-2020-10803
- URL-http://lists.opensuse.org/opensuse-security-announce/2020-03/msg00046.html
- URL-http://lists.opensuse.org/opensuse-security-announce/2020-03/msg00050.html
- URL-http://lists.opensuse.org/opensuse-security-announce/2020-11/msg00005.html
- URL-https://lists.debian.org/debian-lts-announce/2020/03/msg00028.html
- URL-https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/AAVW3SUKWR5RF5LZ6SARCYOWBIFUIWOJ/
- URL-https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/BUG3IRITW2LUBGR5LSQMP7MVRTELHZJK/
- URL-https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/UZI6EQVRRIG252DY3MBT33BJVCSYDMQO/
- URL-https://www.phpmyadmin.net/security/PMASA-2020-4/
NEW
Explore Exposure Command
Confidently identify and prioritize exposures from endpoint to cloud with full attack surface visibility and threat-aware risk context.