First published: Sat Jan 26 2019(Updated: )
An issue was discovered in phpMyAdmin before 4.8.5. When the AllowArbitraryServer configuration setting is set to true, with the use of a rogue MySQL server, an attacker can read any file on the server that the web server's user can access. This is related to the mysql.allow_local_infile PHP configuration, and the inadvertent ignoring of "options(MYSQLI_OPT_LOCAL_INFILE" calls.
Credit: cve@mitre.org cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
phpMyAdmin phpMyAdmin | >=4.0.0<=4.8.4 | |
Debian Debian Linux | =8.0 | |
composer/phpmyadmin/phpmyadmin | >=4.8<4.8.5 | 4.8.5 |
>=4.0.0<=4.8.4 | ||
=8.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of CVE-2019-6799 is medium.
CVE-2019-6799 allows an attacker to read any file on the server that the web server's user can access.
The affected software for CVE-2019-6799 is phpMyAdmin versions before 4.8.5 and Debian Linux 8.0.
To fix CVE-2019-6799, update phpMyAdmin to version 4.8.5 or above and apply the necessary security patches for Debian Linux.
You can find more information about CVE-2019-6799 at the following references: http://www.securityfocus.com/bid/106736, https://lists.debian.org/debian-lts-announce/2019/02/msg00039.html, https://www.phpmyadmin.net/security/PMASA-2019-1/