First published: Sat Jan 18 2020(Updated: )
In phpMyAdmin 4.x before 4.9.5 and 5.x before 5.0.2, a SQL injection vulnerability has been discovered where certain parameters are not properly escaped when generating certain queries for search actions in libraries/classes/Controllers/Table/TableSearchController.php. An attacker can generate a crafted database or table name. The attack can be performed if a user attempts certain search operations on the malicious database or table.
Credit: cve@mitre.org cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
composer/phpmyadmin/phpmyadmin | >=4.9.0<4.9.5>=5.0.0<5.0.2 | |
phpMyAdmin phpMyAdmin | >=4.0.0<4.9.5 | |
phpMyAdmin phpMyAdmin | >=5.0.0<5.0.2 | |
Debian Debian Linux | =8.0 | |
Fedoraproject Fedora | =30 | |
Fedoraproject Fedora | =31 | |
Fedoraproject Fedora | =32 | |
openSUSE Backports SLE | =15.0 | |
openSUSE Backports SLE | =15.0-sp1 | |
openSUSE Leap | =15.1 | |
Suse Package Hub | ||
SUSE Linux Enterprise | =12.0 | |
composer/phpmyadmin/phpmyadmin | >=5.0.0<5.0.2 | 5.0.2 |
composer/phpmyadmin/phpmyadmin | >=4.9.0<4.9.5 | 4.9.5 |
All of | ||
Suse Package Hub | ||
SUSE Linux Enterprise | =12.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2020-10802 is a vulnerability related to SQL injection in the searching feature of phpMyAdmin.
The severity of CVE-2020-10802 is high.
CVE-2020-10802 allows an attacker to inject malicious SQL code through the search functionality of phpMyAdmin, leading to unauthorized access or manipulation of the database.
Yes, phpMyAdmin has released a patch to fix CVE-2020-10802. It is recommended to upgrade to phpMyAdmin version 4.9.6 or 5.0.3 or later.
You can find more information about CVE-2020-10802 on the official phpMyAdmin website: https://www.phpmyadmin.net/security/PMASA-2020-3/