9.8 High
CVSS3
Attack Vector
NETWORK
Attack Complexity
LOW
Privileges Required
NONE
User Interaction
NONE
Scope
UNCHANGED
Confidentiality Impact
HIGH
Integrity Impact
HIGH
Availability Impact
HIGH
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
7.5 High
CVSS2
Access Vector
NETWORK
Access Complexity
LOW
Authentication
NONE
Confidentiality Impact
PARTIAL
Integrity Impact
PARTIAL
Availability Impact
PARTIAL
AV:N/AC:L/Au:N/C:P/I:P/A:P
phpMyAdmin is vulnerable to arbitrary code execution. The application does not escape certain Git information in libraries/classes/Display/GitRevision.php
and libraries/classes/Footer.php
, allowing an attacker to execute arbitrary code in the context of the server.
CPE | Name | Operator | Version |
---|---|---|---|
phpmyadmin:stretch | eq | 4:4.6.6-4+deb9u1 | |
phpmyadmin:stretch | eq | 4:4.6.6-4+deb9u1 |
github.com/phpmyadmin/phpmyadmin/commit/1119de642b136d20e810bb20f545069a01dd7cc9
github.com/phpmyadmin/phpmyadmin/compare/RELEASE_4_9_1...RELEASE_4_9_2
lists.debian.org/debian-lts-announce/2019/12/msg00006.html
lists.debian.org/debian-lts-announce/2020/10/msg00024.html
security-tracker.debian.org/tracker/CVE-2019-19617
www.phpmyadmin.net/news/2019/11/22/phpmyadmin-492-released/
9.8 High
CVSS3
Attack Vector
NETWORK
Attack Complexity
LOW
Privileges Required
NONE
User Interaction
NONE
Scope
UNCHANGED
Confidentiality Impact
HIGH
Integrity Impact
HIGH
Availability Impact
HIGH
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
7.5 High
CVSS2
Access Vector
NETWORK
Access Complexity
LOW
Authentication
NONE
Confidentiality Impact
PARTIAL
Integrity Impact
PARTIAL
Availability Impact
PARTIAL
AV:N/AC:L/Au:N/C:P/I:P/A:P