Description
An issue was discovered in phpMyAdmin. A user can execute a remote code execution attack against a server when phpMyAdmin is being run as a CGI application. Under certain server configurations, a user can pass a query string which is executed as a command-line argument by the file generator_plugin.sh. All 4.6.x versions (prior to 4.6.4), 4.4.x versions (prior to 4.4.15.8), and 4.0.x versions (prior to 4.0.10.17) are affected.
No analysis available yet.
Remediation
No remediation available yet.
Tracking
Sign in to view the affected projects.
Advisories
| Source | ID | Title |
|---|---|---|
Debian DLA |
DLA-626-1 | phpmyadmin security update |
Debian DLA |
DLA-1821-1 | phpmyadmin security update |
EUVD |
EUVD-2016-7538 | An issue was discovered in phpMyAdmin. A user can execute a remote code execution attack against a server when phpMyAdmin is being run as a CGI application. Under certain server configurations, a user can pass a query string which is executed as a command-line argument by the file generator_plugin.sh. All 4.6.x versions (prior to 4.6.4), 4.4.x versions (prior to 4.4.15.8), and 4.0.x versions (prior to 4.0.10.17) are affected. |
References
History
No history.
Status: PUBLISHED
Assigner: mitre
Published:
Updated: 2024-08-06T01:36:29.029Z
Reserved: 2016-08-06T00:00:00.000Z
Link: CVE-2016-6631
No data.
Status : Deferred
Published: 2016-12-11T02:59:40.740
Modified: 2025-04-12T10:46:40.837
Link: CVE-2016-6631
No data.
OpenCVE Enrichment
No data.
Weaknesses
Debian DLA
EUVD