First published: Wed Sep 20 2023(Updated: )
phpPgAdmin 7.14.4 and earlier is vulnerable to deserialization of untrusted data which may lead to remote code execution because user-controlled data is directly passed to the PHP 'unserialize()' function in multiple places. An example is the functionality to manage tables in 'tables.php' where the 'ma[]' POST parameter is deserialized.
Credit: cve@mitre.org cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
phpPgAdmin | <=7.14.4 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2023-40619 is a vulnerability in phpPgAdmin 7.14.4 and earlier that allows for the deserialization of untrusted data, potentially leading to remote code execution.
CVE-2023-40619 exploits the vulnerability by passing user-controlled data directly to the PHP 'unserialize()' function, potentially allowing an attacker to execute arbitrary code.
The severity of CVE-2023-40619 is critical, with a severity value of 9.8.
phpPgAdmin versions 7.14.4 and earlier are affected by CVE-2023-40619.
To mitigate the vulnerability in phpPgAdmin, it is recommended to update to a version that includes a fix for CVE-2023-40619 and to follow best practices for secure development and deployment.