Description
In phpMyAdmin 4.x before 4.9.5 and 5.x before 5.0.2, a SQL injection vulnerability was discovered where malicious code could be used to trigger an XSS attack through retrieving and displaying results (in tbl_get_field.php and libraries/classes/Display/Results.php). The attacker must be able to insert crafted data into certain database tables, which when retrieved (for instance, through the Browse tab) can trigger the XSS attack.
No analysis available yet.
Remediation
No remediation available yet.
Tracking
Sign in to view the affected projects.
Advisories
| Source | ID | Title |
|---|---|---|
Debian DLA |
DLA-2154-1 | phpmyadmin security update |
EUVD |
EUVD-2022-3753 | In phpMyAdmin 4.x before 4.9.5 and 5.x before 5.0.2, a SQL injection vulnerability was discovered where malicious code could be used to trigger an XSS attack through retrieving and displaying results (in tbl_get_field.php and libraries/classes/Display/Results.php). The attacker must be able to insert crafted data into certain database tables, which when retrieved (for instance, through the Browse tab) can trigger the XSS attack. |
Github GHSA |
GHSA-fcww-8wvc-38q9 | phpMyAdmin SQL injection vulnerability |
Ubuntu USN |
USN-4639-1 | phpMyAdmin vulnerabilities |
References
History
No history.
Status: PUBLISHED
Assigner: mitre
Published:
Updated: 2024-08-04T11:14:15.610Z
Reserved: 2020-03-22T00:00:00.000Z
Link: CVE-2020-10803
No data.
Status : Modified
Published: 2020-03-22T05:15:11.667
Modified: 2024-11-21T04:56:06.247
Link: CVE-2020-10803
No data.
OpenCVE Enrichment
No data.
Debian DLA
EUVD
Github GHSA
Ubuntu USN