First published: Wed Jan 01 2020(Updated: )
In phpMyAdmin 4 before 4.9.4 and 5 before 5.0.1, SQL injection exists in the user accounts page. A malicious user could inject custom SQL in place of their own username when creating queries to this page. An attacker must have a valid MySQL account to access the server.
Credit: cve@mitre.org cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
composer/phpmyadmin/phpmyadmin | >=4.0.0<4.9.4>=5.0.0<5.0.1 | |
composer/phpmyadmin/phpmyadmin | >=5.0.0<5.0.1 | 5.0.1 |
composer/phpmyadmin/phpmyadmin | >=4.0.0<4.9.4 | 4.9.4 |
phpMyAdmin | >=4.0.0<4.9.4 | |
phpMyAdmin | >=5.0.0<5.0.1 | |
SUSE Linux Enterprise Server | =12 | |
Debian | =8.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The vulnerability ID CVE-2020-5504 refers to a SQL injection vulnerability in the user accounts page.
Versions 4.0.0 up to 4.9.4 and versions 5.0.0 up to 5.0.1 of the phpMyAdmin software are affected by CVE-2020-5504.
The severity of CVE-2020-5504 is not available.
The SQL injection vulnerability in the user accounts page allows an attacker to execute malicious SQL queries, potentially giving them unauthorized access to sensitive information or allowing them to manipulate the database.
To fix the SQL injection vulnerability in the user accounts page, it is recommended to update to a patched version of phpMyAdmin that addresses the vulnerability.