[Forgot Password]
Login  Register Subscribe

30389

 
 

423868

 
 

244411

 
 

909

 
 

193363

 
 

277

Paid content will be excluded from the download.


Download | Alert*
CVE
view JSON

CVE-2020-10802Date: (C)2020-03-23   (M)2023-12-22


In phpMyAdmin 4.x before 4.9.5 and 5.x before 5.0.2, a SQL injection vulnerability has been discovered where certain parameters are not properly escaped when generating certain queries for search actions in libraries/classes/Controllers/Table/TableSearchController.php. An attacker can generate a crafted database or table name. The attack can be performed if a user attempts certain search operations on the malicious database or table.

CVSS Score and Metrics +CVSS Score and Metrics -

CVSS V3 Severity:CVSS V2 Severity:
CVSS Score : 8.0CVSS Score : 6.0
Exploit Score: 2.1Exploit Score: 6.8
Impact Score: 5.9Impact Score: 6.4
 
CVSS V3 Metrics:CVSS V2 Metrics:
Attack Vector: NETWORKAccess Vector: NETWORK
Attack Complexity: LOWAccess Complexity: MEDIUM
Privileges Required: LOWAuthentication: SINGLE
User Interaction: REQUIREDConfidentiality: PARTIAL
Scope: UNCHANGEDIntegrity: PARTIAL
Confidentiality: HIGHAvailability: PARTIAL
Integrity: HIGH 
Availability: HIGH 
  
Reference:
FEDORA-2020-25f3aea389
FEDORA-2020-d7b0a5a84a
FEDORA-2020-e60ce63865
https://lists.debian.org/debian-lts-announce/2020/03/msg00028.html
https://www.phpmyadmin.net/security/PMASA-2020-3/
openSUSE-SU-2020:0405
openSUSE-SU-2020:0427
openSUSE-SU-2020:1806

CPE    2
cpe:/a:phpmyadmin:phpmyadmin
cpe:/o:debian:debian_linux:8.0
CWE    1
CWE-89
OVAL    3
oval:org.secpod.oval:def:70271
oval:org.secpod.oval:def:705766
oval:org.secpod.oval:def:2003940

© SecPod Technologies