Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

debian логотип

CVE-2019-6799

Опубликовано: 26 янв. 2019
Источник: debian
EPSS Средний

Описание

An issue was discovered in phpMyAdmin before 4.8.5. When the AllowArbitraryServer configuration setting is set to true, with the use of a rogue MySQL server, an attacker can read any file on the server that the web server's user can access. This is related to the mysql.allow_local_infile PHP configuration, and the inadvertent ignoring of "options(MYSQLI_OPT_LOCAL_INFILE" calls.

Пакеты

ПакетСтатусВерсия исправленияРелизТип
phpmyadminfixed4:4.9.1+dfsg1-2package
phpmyadminfixed4:4.6.6-4+deb9u1stretchpackage

Примечания

  • https://www.phpmyadmin.net/security/PMASA-2019-1/

  • https://github.com/phpmyadmin/phpmyadmin/commit/aeac90623e525057a7672ab3d98154b5c57c15ec

  • https://github.com/phpmyadmin/phpmyadmin/commit/c5e01f84ad48c5c626001cb92d7a95500920a900

EPSS

Процентиль: 99%
0.68816
Средний

Связанные уязвимости

CVSS3: 5.9
ubuntu
больше 6 лет назад

An issue was discovered in phpMyAdmin before 4.8.5. When the AllowArbitraryServer configuration setting is set to true, with the use of a rogue MySQL server, an attacker can read any file on the server that the web server's user can access. This is related to the mysql.allow_local_infile PHP configuration, and the inadvertent ignoring of "options(MYSQLI_OPT_LOCAL_INFILE" calls.

CVSS3: 5.9
nvd
больше 6 лет назад

An issue was discovered in phpMyAdmin before 4.8.5. When the AllowArbitraryServer configuration setting is set to true, with the use of a rogue MySQL server, an attacker can read any file on the server that the web server's user can access. This is related to the mysql.allow_local_infile PHP configuration, and the inadvertent ignoring of "options(MYSQLI_OPT_LOCAL_INFILE" calls.

CVSS3: 5.9
github
около 3 лет назад

phpMyAdmin Arbitrary file read vulnerability

suse-cvrf
больше 6 лет назад

Security update for phpMyAdmin

EPSS

Процентиль: 99%
0.68816
Средний