vulnerability
phpMyAdmin: Improper Control of Generation of Code ('Code Injection') (CVE-2016-5734)
Severity | CVSS | Published | Added | Modified |
---|---|---|---|---|
8 | (AV:N/AC:L/Au:N/C:P/I:P/A:P) | Jul 2, 2016 | May 4, 2017 | Nov 27, 2024 |
Severity
8
CVSS
(AV:N/AC:L/Au:N/C:P/I:P/A:P)
Published
Jul 2, 2016
Added
May 4, 2017
Modified
Nov 27, 2024
Description
phpMyAdmin 4.0.x before 4.0.10.16, 4.4.x before 4.4.15.7, and 4.6.x before 4.6.3 does not properly choose delimiters to prevent use of the preg_replace e (aka eval) modifier, which might allow remote attackers to execute arbitrary PHP code via a crafted string, as demonstrated by the table search-and-replace implementation.
Solution
phpmyadmin-upgrade-latest
References
- CVE-2016-5734
- https://attackerkb.com/topics/CVE-2016-5734
- URL-http://www.securityfocus.com/bid/91387
- URL-https://github.com/phpmyadmin/phpmyadmin/commit/1cc7466db3a05e95fe57a6702f41773e6829d54b
- URL-https://github.com/phpmyadmin/phpmyadmin/commit/4bcc606225f15bac0b07780e74f667f6ac283da7
- URL-https://security.gentoo.org/glsa/201701-32
- URL-https://www.exploit-db.com/exploits/40185/
- URL-https://www.phpmyadmin.net/security/PMASA-2016-27/

NEW
Explore Exposure Command
Confidently identify and prioritize exposures from endpoint to cloud with full attack surface visibility and threat-aware risk context.