First published: Wed Mar 18 2020(Updated: )
In phpMyAdmin 4.x before 4.9.5 and 5.x before 5.0.2, a SQL injection vulnerability was found in retrieval of the current username (in libraries/classes/Server/Privileges.php and libraries/classes/UserPassword.php). A malicious user with access to the server could create a crafted username, and then trick the victim into performing specific actions with that user account (such as editing its privileges).
Credit: cve@mitre.org cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
composer/phpmyadmin/phpmyadmin | >=4.9.0<4.9.5>=5.0.0<5.0.2 | |
phpMyAdmin phpMyAdmin | >=4.0.0<4.9.5 | |
phpMyAdmin phpMyAdmin | >=5.0.0<5.0.2 | |
Fedoraproject Fedora | =30 | |
Fedoraproject Fedora | =31 | |
Fedoraproject Fedora | =32 | |
openSUSE Backports SLE | =15.0 | |
openSUSE Backports SLE | =15.0-sp1 | |
openSUSE Leap | =15.1 | |
Suse Package Hub | ||
SUSE Linux Enterprise | =12.0 | |
composer/phpmyadmin/phpmyadmin | >=5.0.0<5.0.2 | 5.0.2 |
composer/phpmyadmin/phpmyadmin | >=4.9.0<4.9.5 | 4.9.5 |
All of | ||
Suse Package Hub | ||
SUSE Linux Enterprise | =12.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The vulnerability ID for this SQL injection is CVE-2020-10804.
The severity of CVE-2020-10804 is dependent on the specific use case and configuration, but SQL injections can have a high impact if exploited.
The SQL injection vulnerability in phpMyAdmin allows an attacker to manipulate the processing of usernames, potentially gaining unauthorized access or causing data breaches.
Versions 4.9.0 to 4.9.5 and 5.0.0 to 5.0.2 of phpMyAdmin are affected by this SQL injection vulnerability.
To fix the SQL injection vulnerability, it is recommended to update phpMyAdmin to a version that includes the security patch provided by the vendor.