First published: Mon Mar 05 2018(Updated: )
### Impact All users are affected. ### Patches * Unsuccessfully patched by 0fae40fb, included in version [4.4.0](https://github.com/vrana/adminer/releases/tag/v4.4.0). * Patched by 35bfaa75, included in version [4.7.8](https://github.com/vrana/adminer/releases/tag/v4.7.8). ### Workarounds Protect access to Adminer also by other means, e.g. by HTTP password, IP address limiting or by OTP [plugin](https://www.adminer.org/plugins/). ### References * http://hyp3rlinx.altervista.org/advisories/ADMINER-UNAUTHENTICATED-SERVER-SIDE-REQUEST-FORGERY.txt * https://sourceforge.net/p/adminer/bugs-and-features/769/ * https://gusralph.info/adminer-ssrf-bypass-cve-2018-7667/ (CVE-2020-28654) ### For more information If you have any questions or comments about this advisory: * Comment at 35bfaa75.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
composer/vrana/adminer | <4.7.8 | 4.7.8 |
Adminer Adminer | <=4.3.1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2018-7667 is classified as a critical vulnerability affecting all users.
To fix CVE-2018-7667, upgrade to version 4.7.8 of Adminer or later.
CVE-2018-7667 affects all versions of Adminer up to and including 4.3.1.
No specific workarounds are recommended for CVE-2018-7667, so upgrading is advised.
CVE-2018-7667 is categorized as an unauthenticated server-side request forgery vulnerability.