A vulnerability was found that allows an attacker to trigger a CSRF attack against a phpMyAdmin user. Published: Septem9:15:11 AM -0400Īn issue was discovered in phpMyAdmin before 4.9.0. Published: Novem4:15:10 PM -0500Ī CSRF issue in phpMyAdmin 4.9.0.1 allows deletion of any server in the Setup page. A crafted database/table name can be used to trigger a SQL injection attack through the designer feature. Published: Decem10:15:10 PM -0500Īn issue was discovered in phpMyAdmin before 4.9.2. PhpMyAdmin before 4.9.2 does not escape certain Git information, related to libraries/classes/Display/GitRevision.php and libraries/classes/Footer.php. An attacker must have a valid MySQL account to access the server. A malicious user could inject custom SQL in place of their own username when creating queries to this page. In phpMyAdmin 4 before 4.9.4 and 5 before 5.0.1, SQL injection exists in the user accounts page. A malicious user with access to the server could create a crafted username, and then trick the victim into performing specific actions with that user account (such as editing its privileges). In phpMyAdmin 4.x before 4.9.5 and 5.x before 5.0.2, a SQL injection vulnerability was found in retrieval of the current username (in libraries/classes/Server/Privileges.php and libraries/classes/UserPassword.php). The attack can be performed if a user attempts certain search operations on the malicious database or table. An attacker can generate a crafted database or table name. In phpMyAdmin 4.x before 4.9.5 and 5.x before 5.0.2, a SQL injection vulnerability has been discovered where certain parameters are not properly escaped when generating certain queries for search actions in libraries/classes/Controllers/Table/TableSearchController.php. The attacker must be able to insert crafted data into certain database tables, which when retrieved (for instance, through the Browse tab) can trigger the XSS attack. In phpMyAdmin 4.x before 4.9.5 and 5.x before 5.0.2, a SQL injection vulnerability was discovered where malicious code could be used to trigger an XSS attack through retrieving and displaying results (in tbl_get_field.php and libraries/classes/Display/Results.php). NOTE: the vendor disputes this because "the CSV file is accurately generated based on the database contents." Published: Novem12:15:13 PM -0500 ** DISPUTED ** phpMyAdmin through 5.0.2 allows CSV injection via Export Section. This affects the lang parameter, the pma_parameter, and the cookie section. PhpMyAdmin 5.1.1 and before allows an attacker to retrieve potentially sensitive information by creating invalid requests. sql file through the drag-and-drop interface. In phpMyAdmin before 4.9.11 and 5.x before 5.2.1, an authenticated user can trigger XSS by uploading a crafted.
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |