In phpMyAdmin 4.x before 4.9.5 and 5.x before 5.0.2, a SQL injection vulnerability has been discovered where certain parameters are not properly escaped when generating certain queries for search actions in libraries/classes/Controllers/Table/TableSearchController.php. An attacker can generate a crafted database or table name. The attack can be performed if a user attempts certain search operations on the malicious database or table.
CPE | Name | Operator | Version |
---|---|---|---|
debian_linux | eq | 8.0 | |
fedora | eq | 30 | |
fedora | eq | 31 | |
fedora | eq | 32 | |
backports_sle | eq | 15.0 sp1 | |
backports_sle | eq | 15.0 | |
leap | eq | 15.1 | |
phpmyadmin | ge | 5.0.0 | |
phpmyadmin | lt | 5.0.2 | |
phpmyadmin | ge | 4.0.0 |
lists.opensuse.org/opensuse-security-announce/2020-03/msg00046.html
lists.opensuse.org/opensuse-security-announce/2020-03/msg00050.html
lists.opensuse.org/opensuse-security-announce/2020-11/msg00005.html
lists.debian.org/debian-lts-announce/2020/03/msg00028.html
lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/AAVW3SUKWR5RF5LZ6SARCYOWBIFUIWOJ/
lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/BUG3IRITW2LUBGR5LSQMP7MVRTELHZJK/
lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/UZI6EQVRRIG252DY3MBT33BJVCSYDMQO/
www.phpmyadmin.net/security/PMASA-2020-3/