Headline
CVE-2020-10803: Security - PMASA-2020-4
In phpMyAdmin 4.x before 4.9.5 and 5.x before 5.0.2, a SQL injection vulnerability was discovered where malicious code could be used to trigger an XSS attack through retrieving and displaying results (in tbl_get_field.php and libraries/classes/Display/Results.php). The attacker must be able to insert crafted data into certain database tables, which when retrieved (for instance, through the Browse tab) can trigger the XSS attack.
Announcement-ID: PMASA-2020-4
Date: 2020-03-20
Updated: 2020-03-22
Summary
SQL injection relating to data display
Description
An SQL injection vulnerability was discovered where malicious code could be used to trigger an XSS attack through retrieving and displaying results.
The attack requires an attacker be able to insert specially-crafted data in to certain database tables, which when retrieved (for instance, through the Browse tab) can trigger the XSS attack.
Severity
We consider this flaw to be of moderate severity.
Affected Versions
phpMyAdmin 4.9.x releases prior to 4.9.5 and the 5.0.x releases prior to 5.0.2 are affected. We believe the flaw was introduced with phpMyAdmin 3.4.
Solution
Upgrade to phpMyAdmin 4.9.5 or 5.0.2 or newer or apply patch listed below.
References
Thanks to Yutaka WATANABE for reporting this vulnerability.
Assigned CVE ids: CVE-2020-10803
CWE ids: CWE-661
Patches
The following commits have been made to fix this issue:
- 2489837213b90664aceebe4c9ac641bf167b8a97
- 46a7aa7cd4ff2be0eeb23721fbf71567bebe69a5
- 6b9b2601d8af916659cde8aefd3a6eaadd10284a
More information
For further information and in case of questions, please contact the phpMyAdmin team. Our website is phpmyadmin.net.