vulnerability
phpMyAdmin: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') (CVE-2020-10804)
Severity | CVSS | Published | Added | Modified |
---|---|---|---|---|
6 | (AV:N/AC:M/Au:S/C:P/I:P/A:P) | 2020-03-22 | 2020-03-25 | 2023-11-08 |
Severity
6
CVSS
(AV:N/AC:M/Au:S/C:P/I:P/A:P)
Published
2020-03-22
Added
2020-03-25
Modified
2023-11-08
Description
In phpMyAdmin 4.x before 4.9.5 and 5.x before 5.0.2, a SQL injection vulnerability was found in retrieval of the current username (in libraries/classes/Server/Privileges.php and libraries/classes/UserPassword.php). A malicious user with access to the server could create a crafted username, and then trick the victim into performing specific actions with that user account (such as editing its privileges).
Solution(s)
phpmyadmin-upgrade-4_9_5phpmyadmin-upgrade-5_0_2
References
- CVE-2020-10804
- https://attackerkb.com/topics/CVE-2020-10804
- URL-http://lists.opensuse.org/opensuse-security-announce/2020-03/msg00046.html
- URL-http://lists.opensuse.org/opensuse-security-announce/2020-03/msg00050.html
- URL-http://lists.opensuse.org/opensuse-security-announce/2020-11/msg00005.html
- URL-https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/AAVW3SUKWR5RF5LZ6SARCYOWBIFUIWOJ/
- URL-https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/BUG3IRITW2LUBGR5LSQMP7MVRTELHZJK/
- URL-https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/UZI6EQVRRIG252DY3MBT33BJVCSYDMQO/
- URL-https://www.phpmyadmin.net/security/PMASA-2020-2/

NEW
Explore Exposure Command
Confidently identify and prioritize exposures from endpoint to cloud with full attack surface visibility and threat-aware risk context.