An attacker can exploit phpMyAdmin before 4.8.4 to leak the contents of a local file because of an error in the transformation feature. The attacker must have access to the phpMyAdmin Configuration Storage tables, although these can easily be created in any database to which the attacker has access. An attacker must have valid credentials to log in to phpMyAdmin; this vulnerability does not allow an attacker to circumvent the login system.
Metrics
Affected Vendors & Products
Advisories
| Source | ID | Title |
|---|---|---|
Debian DLA |
DLA-1658-1 | phpmyadmin security update |
EUVD |
EUVD-2022-5764 | An attacker can exploit phpMyAdmin before 4.8.4 to leak the contents of a local file because of an error in the transformation feature. The attacker must have access to the phpMyAdmin Configuration Storage tables, although these can easily be created in any database to which the attacker has access. An attacker must have valid credentials to log in to phpMyAdmin; this vulnerability does not allow an attacker to circumvent the login system. |
Github GHSA |
GHSA-xc97-r49q-cxgc | phpMyAdmin Local file inclusion through transformation feature |
Ubuntu USN |
USN-4639-1 | phpMyAdmin vulnerabilities |
Ubuntu USN |
USN-4843-1 | phpMyAdmin vulnerabilities |
Fixes
Solution
No solution given by the vendor.
Workaround
No workaround given by the vendor.
References
History
No history.
Status: PUBLISHED
Assigner: mitre
Published:
Updated: 2024-08-05T11:51:17.786Z
Reserved: 2018-12-07T00:00:00
Link: CVE-2018-19968
No data.
Status : Modified
Published: 2018-12-11T17:29:00.227
Modified: 2024-11-21T03:58:54.620
Link: CVE-2018-19968
No data.
OpenCVE Enrichment
No data.
Debian DLA
EUVD
Github GHSA
Ubuntu USN