phpPgAdmin 7.14.4 and earlier is vulnerable to deserialization of untrusted data which may lead to remote code execution because user-controlled data is directly passed to the PHP 'unserialize()' function in multiple places. An example is the functionality to manage tables in 'tables.php' where the 'ma[]' POST parameter is deserialized.
Metrics
Affected Vendors & Products
Advisories
| Source | ID | Title |
|---|---|---|
Debian DLA |
DLA-3644-1 | phppgadmin security update |
EUVD |
EUVD-2023-45175 | phpPgAdmin 7.14.4 and earlier is vulnerable to deserialization of untrusted data which may lead to remote code execution because user-controlled data is directly passed to the PHP 'unserialize()' function in multiple places. An example is the functionality to manage tables in 'tables.php' where the 'ma[]' POST parameter is deserialized. |
Fixes
Solution
No solution given by the vendor.
Workaround
No workaround given by the vendor.
References
History
Wed, 25 Sep 2024 15:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Status: PUBLISHED
Assigner: mitre
Published:
Updated: 2024-09-25T14:18:05.914Z
Reserved: 2023-08-17T00:00:00
Link: CVE-2023-40619
Updated: 2024-08-02T18:38:51.014Z
Status : Modified
Published: 2023-09-20T18:15:12.433
Modified: 2024-11-21T08:19:50.173
Link: CVE-2023-40619
No data.
OpenCVE Enrichment
No data.
Debian DLA
EUVD