Description
An issue was discovered in phpMyAdmin. A specially crafted database name could be used to run arbitrary PHP commands through the array export feature. All 4.6.x versions (prior to 4.6.4), 4.4.x versions (prior to 4.4.15.8), and 4.0.x versions (prior to 4.0.10.17) are affected.
No analysis available yet.
Remediation
No remediation available yet.
Tracking
Sign in to view the affected projects.
Advisories
| Source | ID | Title |
|---|---|---|
Debian DLA |
DLA-626-1 | phpmyadmin security update |
Debian DLA |
DLA-1415-1 | phpmyadmin security update |
EUVD |
EUVD-2022-5617 | An issue was discovered in phpMyAdmin. A specially crafted database name could be used to run arbitrary PHP commands through the array export feature. All 4.6.x versions (prior to 4.6.4), 4.4.x versions (prior to 4.4.15.8), and 4.0.x versions (prior to 4.0.10.17) are affected. |
Github GHSA |
GHSA-wpww-hx7x-xfjh | phpMyAdmin PHP code injection |
Ubuntu USN |
USN-4843-1 | phpMyAdmin vulnerabilities |
References
History
No history.
Status: PUBLISHED
Assigner: mitre
Published:
Updated: 2024-08-06T01:36:29.411Z
Reserved: 2016-08-06T00:00:00.000Z
Link: CVE-2016-6609
No data.
Status : Deferred
Published: 2016-12-11T02:59:14.280
Modified: 2025-04-12T10:46:40.837
Link: CVE-2016-6609
No data.
OpenCVE Enrichment
No data.
Weaknesses
Debian DLA
EUVD
Github GHSA
Ubuntu USN