First published: Thu Jul 04 2013(Updated: )
import.php in phpMyAdmin 4.x before 4.0.4.1 does not properly restrict the ability of input data to specify a file format, which allows remote authenticated users to modify the GLOBALS superglobal array, and consequently change the configuration, via a crafted request.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
composer/phpmyadmin/phpmyadmin | >=4.0<4.0.4.1 | 4.0.4.1 |
PhpMyAdmin | =4.0.0 | |
PhpMyAdmin | =4.0.0-rc2 | |
PhpMyAdmin | =4.0.0-rc3 | |
PhpMyAdmin | =4.0.1 | |
PhpMyAdmin | =4.0.2 | |
PhpMyAdmin | =4.0.3 | |
PhpMyAdmin | =4.0.4 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2013-4729 has a medium severity level due to its potential for unauthorized configuration changes.
To fix CVE-2013-4729, upgrade phpMyAdmin to version 4.0.4.1 or later.
Users of phpMyAdmin versions 4.0.0 through 4.0.4 are affected by CVE-2013-4729.
CVE-2013-4729 allows remote authenticated users to manipulate the GLOBALS superglobal array and change configurations.
Yes, CVE-2013-4729 can be exploited remotely by authenticated users.