In phpMyAdmin 4.x before 4.9.5 and 5.x before 5.0.2, a SQL injection vulnerability has been discovered where certain parameters are not properly escaped when generating certain queries for search actions in libraries/classes/Controllers/Table/TableSearchController.php. An attacker can generate a crafted database or table name. The attack can be performed if a user attempts certain search operations on the malicious database or table.
lists.opensuse.org/opensuse-security-announce/2020-03/msg00046.html
lists.opensuse.org/opensuse-security-announce/2020-03/msg00050.html
lists.opensuse.org/opensuse-security-announce/2020-11/msg00005.html
github.com/FriendsOfPHP/security-advisories/blob/master/phpmyadmin/phpmyadmin/CVE-2020-10802.yaml
github.com/phpmyadmin/composer
lists.debian.org/debian-lts-announce/2020/03/msg00028.html
lists.fedoraproject.org/archives/list/[email protected]/message/AAVW3SUKWR5RF5LZ6SARCYOWBIFUIWOJ
lists.fedoraproject.org/archives/list/[email protected]/message/BUG3IRITW2LUBGR5LSQMP7MVRTELHZJK
lists.fedoraproject.org/archives/list/[email protected]/message/UZI6EQVRRIG252DY3MBT33BJVCSYDMQO
nvd.nist.gov/vuln/detail/CVE-2020-10802
www.phpmyadmin.net/security/PMASA-2020-3