Action not permitted
Modal body text goes here.
Modal Title
Modal Body
CVE-2018-12613
Vulnerability from cvelistv5
{ containers: { adp: [ { providerMetadata: { dateUpdated: "2024-08-05T08:38:06.387Z", orgId: "af854a3a-2127-422b-91ae-364da2661108", shortName: "CVE", }, references: [ { tags: [ "x_refsource_CONFIRM", "x_transferred", ], url: "https://www.phpmyadmin.net/security/PMASA-2018-4/", }, { name: "45020", tags: [ "exploit", "x_refsource_EXPLOIT-DB", "x_transferred", ], url: "https://www.exploit-db.com/exploits/45020/", }, { name: "104532", tags: [ "vdb-entry", "x_refsource_BID", "x_transferred", ], url: "http://www.securityfocus.com/bid/104532", }, { name: "44924", tags: [ "exploit", "x_refsource_EXPLOIT-DB", "x_transferred", ], url: "https://www.exploit-db.com/exploits/44924/", }, { name: "44928", tags: [ "exploit", "x_refsource_EXPLOIT-DB", "x_transferred", ], url: "https://www.exploit-db.com/exploits/44928/", }, { name: "GLSA-201904-16", tags: [ "vendor-advisory", "x_refsource_GENTOO", "x_transferred", ], url: "https://security.gentoo.org/glsa/201904-16", }, { tags: [ "x_refsource_MISC", "x_transferred", ], url: "http://packetstormsecurity.com/files/164623/phpMyAdmin-4.8.1-Remote-Code-Execution.html", }, ], title: "CVE Program Container", }, ], cna: { affected: [ { product: "n/a", vendor: "n/a", versions: [ { status: "affected", version: "n/a", }, ], }, ], datePublic: "2018-06-21T00:00:00", descriptions: [ { lang: "en", value: "An issue was discovered in phpMyAdmin 4.8.x before 4.8.2, in which an attacker can include (view and potentially execute) files on the server. The vulnerability comes from a portion of code where pages are redirected and loaded within phpMyAdmin, and an improper test for whitelisted pages. An attacker must be authenticated, except in the \"$cfg['AllowArbitraryServer'] = true\" case (where an attacker can specify any host he/she is already in control of, and execute arbitrary code on phpMyAdmin) and the \"$cfg['ServerDefault'] = 0\" case (which bypasses the login requirement and runs the vulnerable code without any authentication).", }, ], problemTypes: [ { descriptions: [ { description: "n/a", lang: "en", type: "text", }, ], }, ], providerMetadata: { dateUpdated: "2021-10-25T18:06:11", orgId: "8254265b-2729-46b6-b9e3-3dfca2d5bfca", shortName: "mitre", }, references: [ { tags: [ "x_refsource_CONFIRM", ], url: "https://www.phpmyadmin.net/security/PMASA-2018-4/", }, { name: "45020", tags: [ "exploit", "x_refsource_EXPLOIT-DB", ], url: "https://www.exploit-db.com/exploits/45020/", }, { name: "104532", tags: [ "vdb-entry", "x_refsource_BID", ], url: "http://www.securityfocus.com/bid/104532", }, { name: "44924", tags: [ "exploit", "x_refsource_EXPLOIT-DB", ], url: "https://www.exploit-db.com/exploits/44924/", }, { name: "44928", tags: [ "exploit", "x_refsource_EXPLOIT-DB", ], url: "https://www.exploit-db.com/exploits/44928/", }, { name: "GLSA-201904-16", tags: [ "vendor-advisory", "x_refsource_GENTOO", ], url: "https://security.gentoo.org/glsa/201904-16", }, { tags: [ "x_refsource_MISC", ], url: "http://packetstormsecurity.com/files/164623/phpMyAdmin-4.8.1-Remote-Code-Execution.html", }, ], x_legacyV4Record: { CVE_data_meta: { ASSIGNER: "cve@mitre.org", ID: "CVE-2018-12613", STATE: "PUBLIC", }, affects: { vendor: { vendor_data: [ { product: { product_data: [ { product_name: "n/a", version: { version_data: [ { version_value: "n/a", }, ], }, }, ], }, vendor_name: "n/a", }, ], }, }, data_format: "MITRE", data_type: "CVE", data_version: "4.0", description: { description_data: [ { lang: "eng", value: "An issue was discovered in phpMyAdmin 4.8.x before 4.8.2, in which an attacker can include (view and potentially execute) files on the server. The vulnerability comes from a portion of code where pages are redirected and loaded within phpMyAdmin, and an improper test for whitelisted pages. An attacker must be authenticated, except in the \"$cfg['AllowArbitraryServer'] = true\" case (where an attacker can specify any host he/she is already in control of, and execute arbitrary code on phpMyAdmin) and the \"$cfg['ServerDefault'] = 0\" case (which bypasses the login requirement and runs the vulnerable code without any authentication).", }, ], }, problemtype: { problemtype_data: [ { description: [ { lang: "eng", value: "n/a", }, ], }, ], }, references: { reference_data: [ { name: "https://www.phpmyadmin.net/security/PMASA-2018-4/", refsource: "CONFIRM", url: "https://www.phpmyadmin.net/security/PMASA-2018-4/", }, { name: "45020", refsource: "EXPLOIT-DB", url: "https://www.exploit-db.com/exploits/45020/", }, { name: "104532", refsource: "BID", url: "http://www.securityfocus.com/bid/104532", }, { name: "44924", refsource: "EXPLOIT-DB", url: "https://www.exploit-db.com/exploits/44924/", }, { name: "44928", refsource: "EXPLOIT-DB", url: "https://www.exploit-db.com/exploits/44928/", }, { name: "GLSA-201904-16", refsource: "GENTOO", url: "https://security.gentoo.org/glsa/201904-16", }, { name: "http://packetstormsecurity.com/files/164623/phpMyAdmin-4.8.1-Remote-Code-Execution.html", refsource: "MISC", url: "http://packetstormsecurity.com/files/164623/phpMyAdmin-4.8.1-Remote-Code-Execution.html", }, ], }, }, }, }, cveMetadata: { assignerOrgId: "8254265b-2729-46b6-b9e3-3dfca2d5bfca", assignerShortName: "mitre", cveId: "CVE-2018-12613", datePublished: "2018-06-21T20:00:00", dateReserved: "2018-06-21T00:00:00", dateUpdated: "2024-08-05T08:38:06.387Z", state: "PUBLISHED", }, dataType: "CVE_RECORD", dataVersion: "5.1", "vulnerability-lookup:meta": { nvd: "{\"cve\":{\"id\":\"CVE-2018-12613\",\"sourceIdentifier\":\"cve@mitre.org\",\"published\":\"2018-06-21T20:29:00.327\",\"lastModified\":\"2024-11-21T03:45:32.740\",\"vulnStatus\":\"Modified\",\"cveTags\":[],\"descriptions\":[{\"lang\":\"en\",\"value\":\"An issue was discovered in phpMyAdmin 4.8.x before 4.8.2, in which an attacker can include (view and potentially execute) files on the server. The vulnerability comes from a portion of code where pages are redirected and loaded within phpMyAdmin, and an improper test for whitelisted pages. An attacker must be authenticated, except in the \\\"$cfg['AllowArbitraryServer'] = true\\\" case (where an attacker can specify any host he/she is already in control of, and execute arbitrary code on phpMyAdmin) and the \\\"$cfg['ServerDefault'] = 0\\\" case (which bypasses the login requirement and runs the vulnerable code without any authentication).\"},{\"lang\":\"es\",\"value\":\"Se ha descubierto un problema en phpMyAdmin en versiones 4.38.3x anteriores a la 4.8.2 por el cual un atacante puede incluir (ver y, potencialmente, ejecutar) archivos en el servidor. La vulnerabilidad procede de una porción de código en el que las páginas se redirigen y cargan en phpMyAdmin y se realiza una prueba inadecuada para páginas en la lista blanca. Un atacante debe estar autenticado, excepto en el caso en el que \\\"$cfg['AllowArbitraryServer'] = true\\\" (en el que un atacante puede especificar cualquier host que ya controle y ejecutar código arbitrario en phpMyAdmin) y en el caso \\\"$cfg['ServerDefault'] = 0\\\" (que omite el requisito de inicio de sesión y ejecuta el código vulnerable sin autenticación).\"}],\"metrics\":{\"cvssMetricV31\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"3.1\",\"vectorString\":\"CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H\",\"baseScore\":8.8,\"baseSeverity\":\"HIGH\",\"attackVector\":\"NETWORK\",\"attackComplexity\":\"LOW\",\"privilegesRequired\":\"LOW\",\"userInteraction\":\"NONE\",\"scope\":\"UNCHANGED\",\"confidentialityImpact\":\"HIGH\",\"integrityImpact\":\"HIGH\",\"availabilityImpact\":\"HIGH\"},\"exploitabilityScore\":2.8,\"impactScore\":5.9}],\"cvssMetricV2\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"2.0\",\"vectorString\":\"AV:N/AC:L/Au:S/C:P/I:P/A:P\",\"baseScore\":6.5,\"accessVector\":\"NETWORK\",\"accessComplexity\":\"LOW\",\"authentication\":\"SINGLE\",\"confidentialityImpact\":\"PARTIAL\",\"integrityImpact\":\"PARTIAL\",\"availabilityImpact\":\"PARTIAL\"},\"baseSeverity\":\"MEDIUM\",\"exploitabilityScore\":8.0,\"impactScore\":6.4,\"acInsufInfo\":false,\"obtainAllPrivilege\":false,\"obtainUserPrivilege\":false,\"obtainOtherPrivilege\":false,\"userInteractionRequired\":false}]},\"weaknesses\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"description\":[{\"lang\":\"en\",\"value\":\"CWE-287\"}]}],\"configurations\":[{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:phpmyadmin:phpmyadmin:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"4.8.0\",\"versionEndExcluding\":\"4.8.2\",\"matchCriteriaId\":\"04FBC08B-0D3A-44E3-8C3D-82F6723EA7D9\"}]}]}],\"references\":[{\"url\":\"http://packetstormsecurity.com/files/164623/phpMyAdmin-4.8.1-Remote-Code-Execution.html\",\"source\":\"cve@mitre.org\",\"tags\":[\"Exploit\",\"Third Party Advisory\",\"VDB Entry\"]},{\"url\":\"http://www.securityfocus.com/bid/104532\",\"source\":\"cve@mitre.org\",\"tags\":[\"Third Party Advisory\",\"VDB Entry\"]},{\"url\":\"https://security.gentoo.org/glsa/201904-16\",\"source\":\"cve@mitre.org\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://www.exploit-db.com/exploits/44924/\",\"source\":\"cve@mitre.org\",\"tags\":[\"Exploit\",\"Third Party Advisory\",\"VDB Entry\"]},{\"url\":\"https://www.exploit-db.com/exploits/44928/\",\"source\":\"cve@mitre.org\",\"tags\":[\"Third Party Advisory\",\"VDB Entry\"]},{\"url\":\"https://www.exploit-db.com/exploits/45020/\",\"source\":\"cve@mitre.org\",\"tags\":[\"Exploit\",\"Third Party Advisory\",\"VDB Entry\"]},{\"url\":\"https://www.phpmyadmin.net/security/PMASA-2018-4/\",\"source\":\"cve@mitre.org\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"http://packetstormsecurity.com/files/164623/phpMyAdmin-4.8.1-Remote-Code-Execution.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Exploit\",\"Third Party Advisory\",\"VDB Entry\"]},{\"url\":\"http://www.securityfocus.com/bid/104532\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\",\"VDB Entry\"]},{\"url\":\"https://security.gentoo.org/glsa/201904-16\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://www.exploit-db.com/exploits/44924/\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Exploit\",\"Third Party Advisory\",\"VDB Entry\"]},{\"url\":\"https://www.exploit-db.com/exploits/44928/\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\",\"VDB Entry\"]},{\"url\":\"https://www.exploit-db.com/exploits/45020/\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Exploit\",\"Third Party Advisory\",\"VDB Entry\"]},{\"url\":\"https://www.phpmyadmin.net/security/PMASA-2018-4/\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Vendor Advisory\"]}]}}", }, }
gsd-2018-12613
Vulnerability from gsd
{ GSD: { alias: "CVE-2018-12613", description: "An issue was discovered in phpMyAdmin 4.8.x before 4.8.2, in which an attacker can include (view and potentially execute) files on the server. The vulnerability comes from a portion of code where pages are redirected and loaded within phpMyAdmin, and an improper test for whitelisted pages. An attacker must be authenticated, except in the \"$cfg['AllowArbitraryServer'] = true\" case (where an attacker can specify any host he/she is already in control of, and execute arbitrary code on phpMyAdmin) and the \"$cfg['ServerDefault'] = 0\" case (which bypasses the login requirement and runs the vulnerable code without any authentication).", id: "GSD-2018-12613", references: [ "https://www.suse.com/security/cve/CVE-2018-12613.html", "https://packetstormsecurity.com/files/cve/CVE-2018-12613", ], }, gsd: { metadata: { exploitCode: "unknown", remediation: "unknown", reportConfidence: "confirmed", type: "vulnerability", }, osvSchema: { aliases: [ "CVE-2018-12613", ], details: "An issue was discovered in phpMyAdmin 4.8.x before 4.8.2, in which an attacker can include (view and potentially execute) files on the server. The vulnerability comes from a portion of code where pages are redirected and loaded within phpMyAdmin, and an improper test for whitelisted pages. An attacker must be authenticated, except in the \"$cfg['AllowArbitraryServer'] = true\" case (where an attacker can specify any host he/she is already in control of, and execute arbitrary code on phpMyAdmin) and the \"$cfg['ServerDefault'] = 0\" case (which bypasses the login requirement and runs the vulnerable code without any authentication).", id: "GSD-2018-12613", modified: "2023-12-13T01:22:30.493542Z", schema_version: "1.4.0", }, }, namespaces: { "cve.org": { CVE_data_meta: { ASSIGNER: "cve@mitre.org", ID: "CVE-2018-12613", STATE: "PUBLIC", }, affects: { vendor: { vendor_data: [ { product: { product_data: [ { product_name: "n/a", version: { version_data: [ { version_value: "n/a", }, ], }, }, ], }, vendor_name: "n/a", }, ], }, }, data_format: "MITRE", data_type: "CVE", data_version: "4.0", description: { description_data: [ { lang: "eng", value: "An issue was discovered in phpMyAdmin 4.8.x before 4.8.2, in which an attacker can include (view and potentially execute) files on the server. The vulnerability comes from a portion of code where pages are redirected and loaded within phpMyAdmin, and an improper test for whitelisted pages. An attacker must be authenticated, except in the \"$cfg['AllowArbitraryServer'] = true\" case (where an attacker can specify any host he/she is already in control of, and execute arbitrary code on phpMyAdmin) and the \"$cfg['ServerDefault'] = 0\" case (which bypasses the login requirement and runs the vulnerable code without any authentication).", }, ], }, problemtype: { problemtype_data: [ { description: [ { lang: "eng", value: "n/a", }, ], }, ], }, references: { reference_data: [ { name: "https://www.phpmyadmin.net/security/PMASA-2018-4/", refsource: "CONFIRM", url: "https://www.phpmyadmin.net/security/PMASA-2018-4/", }, { name: "45020", refsource: "EXPLOIT-DB", url: "https://www.exploit-db.com/exploits/45020/", }, { name: "104532", refsource: "BID", url: "http://www.securityfocus.com/bid/104532", }, { name: "44924", refsource: "EXPLOIT-DB", url: "https://www.exploit-db.com/exploits/44924/", }, { name: "44928", refsource: "EXPLOIT-DB", url: "https://www.exploit-db.com/exploits/44928/", }, { name: "GLSA-201904-16", refsource: "GENTOO", url: "https://security.gentoo.org/glsa/201904-16", }, { name: "http://packetstormsecurity.com/files/164623/phpMyAdmin-4.8.1-Remote-Code-Execution.html", refsource: "MISC", url: "http://packetstormsecurity.com/files/164623/phpMyAdmin-4.8.1-Remote-Code-Execution.html", }, ], }, }, "gitlab.com": { advisories: [ { affected_range: ">=4.8.0,<4.8.2", affected_versions: "All versions starting from 4.8.0 before 4.8.2", cvss_v2: "AV:N/AC:L/Au:S/C:P/I:P/A:P", cvss_v3: "CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", cwe_ids: [ "CWE-1035", "CWE-287", "CWE-937", ], date: "2019-04-26", description: "An issue was discovered in phpMyAdm in which an attacker can include (view and potentially execute) files on the server. The vulnerability comes from a portion of code where pages are redirected and loaded within phpMyAdmin, and an improper test for allowed pages.", fixed_versions: [ "4.8.2", ], identifier: "CVE-2018-12613", identifiers: [ "CVE-2018-12613", ], not_impacted: "All versions before 4.8.0, all versions starting from 4.8.2", package_slug: "packagist/phpmyadmin/phpmyadmin", pubdate: "2018-06-21", solution: "Upgrade to version 4.8.2 or above.", title: "Improper Authentication", urls: [ "https://nvd.nist.gov/vuln/detail/CVE-2018-12613", "http://www.securityfocus.com/bid/104532", "https://www.exploit-db.com/exploits/44924/", "https://www.exploit-db.com/exploits/44928/", "https://www.exploit-db.com/exploits/45020/", "https://www.phpmyadmin.net/security/PMASA-2018-4/", ], uuid: "644eee48-cbc8-40b9-94ce-b74bcf8febad", }, ], }, "nvd.nist.gov": { configurations: { CVE_data_version: "4.0", nodes: [ { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:a:phpmyadmin:phpmyadmin:*:*:*:*:*:*:*:*", cpe_name: [], versionEndExcluding: "4.8.2", versionStartIncluding: "4.8.0", vulnerable: true, }, ], operator: "OR", }, ], }, cve: { CVE_data_meta: { ASSIGNER: "cve@mitre.org", ID: "CVE-2018-12613", }, data_format: "MITRE", data_type: "CVE", data_version: "4.0", description: { description_data: [ { lang: "en", value: "An issue was discovered in phpMyAdmin 4.8.x before 4.8.2, in which an attacker can include (view and potentially execute) files on the server. The vulnerability comes from a portion of code where pages are redirected and loaded within phpMyAdmin, and an improper test for whitelisted pages. An attacker must be authenticated, except in the \"$cfg['AllowArbitraryServer'] = true\" case (where an attacker can specify any host he/she is already in control of, and execute arbitrary code on phpMyAdmin) and the \"$cfg['ServerDefault'] = 0\" case (which bypasses the login requirement and runs the vulnerable code without any authentication).", }, ], }, problemtype: { problemtype_data: [ { description: [ { lang: "en", value: "CWE-287", }, ], }, ], }, references: { reference_data: [ { name: "https://www.phpmyadmin.net/security/PMASA-2018-4/", refsource: "CONFIRM", tags: [ "Vendor Advisory", ], url: "https://www.phpmyadmin.net/security/PMASA-2018-4/", }, { name: "44928", refsource: "EXPLOIT-DB", tags: [ "Third Party Advisory", "VDB Entry", ], url: "https://www.exploit-db.com/exploits/44928/", }, { name: "104532", refsource: "BID", tags: [ "Third Party Advisory", "VDB Entry", ], url: "http://www.securityfocus.com/bid/104532", }, { name: "44924", refsource: "EXPLOIT-DB", tags: [ "Exploit", "Third Party Advisory", "VDB Entry", ], url: "https://www.exploit-db.com/exploits/44924/", }, { name: "45020", refsource: "EXPLOIT-DB", tags: [ "Exploit", "Third Party Advisory", "VDB Entry", ], url: "https://www.exploit-db.com/exploits/45020/", }, { name: "GLSA-201904-16", refsource: "GENTOO", tags: [ "Third Party Advisory", ], url: "https://security.gentoo.org/glsa/201904-16", }, { name: "http://packetstormsecurity.com/files/164623/phpMyAdmin-4.8.1-Remote-Code-Execution.html", refsource: "MISC", tags: [ "Exploit", "Third Party Advisory", "VDB Entry", ], url: "http://packetstormsecurity.com/files/164623/phpMyAdmin-4.8.1-Remote-Code-Execution.html", }, ], }, }, impact: { baseMetricV2: { acInsufInfo: false, cvssV2: { accessComplexity: "LOW", accessVector: "NETWORK", authentication: "SINGLE", availabilityImpact: "PARTIAL", baseScore: 6.5, confidentialityImpact: "PARTIAL", integrityImpact: "PARTIAL", vectorString: "AV:N/AC:L/Au:S/C:P/I:P/A:P", version: "2.0", }, exploitabilityScore: 8, impactScore: 6.4, obtainAllPrivilege: false, obtainOtherPrivilege: false, obtainUserPrivilege: false, severity: "MEDIUM", userInteractionRequired: false, }, baseMetricV3: { cvssV3: { attackComplexity: "LOW", attackVector: "NETWORK", availabilityImpact: "HIGH", baseScore: 8.8, baseSeverity: "HIGH", confidentialityImpact: "HIGH", integrityImpact: "HIGH", privilegesRequired: "LOW", scope: "UNCHANGED", userInteraction: "NONE", vectorString: "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", version: "3.1", }, exploitabilityScore: 2.8, impactScore: 5.9, }, }, lastModifiedDate: "2021-11-02T17:59Z", publishedDate: "2018-06-21T20:29Z", }, }, }
ghsa-x394-g9j8-x7mf
Vulnerability from github
An issue was discovered in phpMyAdmin 4.8.x before 4.8.2, in which an attacker can include (view and potentially execute) files on the server. The vulnerability comes from a portion of code where pages are redirected and loaded within phpMyAdmin, and an improper test for whitelisted pages. An attacker must be authenticated, except in the "$cfg['AllowArbitraryServer'] = true" case (where an attacker can specify any host he/she is already in control of, and execute arbitrary code on phpMyAdmin) and the "$cfg['ServerDefault'] = 0" case (which bypasses the login requirement and runs the vulnerable code without any authentication).
{ affected: [ { package: { ecosystem: "Packagist", name: "phpmyadmin/phpmyadmin", }, ranges: [ { events: [ { introduced: "4.8", }, { fixed: "4.8.2", }, ], type: "ECOSYSTEM", }, ], }, ], aliases: [ "CVE-2018-12613", ], database_specific: { cwe_ids: [ "CWE-287", ], github_reviewed: true, github_reviewed_at: "2024-04-24T17:15:56Z", nvd_published_at: "2018-06-21T20:29:00Z", severity: "HIGH", }, details: "An issue was discovered in phpMyAdmin 4.8.x before 4.8.2, in which an attacker can include (view and potentially execute) files on the server. The vulnerability comes from a portion of code where pages are redirected and loaded within phpMyAdmin, and an improper test for whitelisted pages. An attacker must be authenticated, except in the \"$cfg['AllowArbitraryServer'] = true\" case (where an attacker can specify any host he/she is already in control of, and execute arbitrary code on phpMyAdmin) and the \"$cfg['ServerDefault'] = 0\" case (which bypasses the login requirement and runs the vulnerable code without any authentication).", id: "GHSA-x394-g9j8-x7mf", modified: "2024-04-24T17:15:57Z", published: "2022-05-13T01:05:22Z", references: [ { type: "ADVISORY", url: "https://nvd.nist.gov/vuln/detail/CVE-2018-12613", }, { type: "PACKAGE", url: "https://github.com/phpmyadmin/composer", }, { type: "WEB", url: "https://security.gentoo.org/glsa/201904-16", }, { type: "WEB", url: "https://www.exploit-db.com/exploits/44924", }, { type: "WEB", url: "https://www.exploit-db.com/exploits/44928", }, { type: "WEB", url: "https://www.exploit-db.com/exploits/45020", }, { type: "WEB", url: "https://www.phpmyadmin.net/security/PMASA-2018-4", }, { type: "WEB", url: "http://packetstormsecurity.com/files/164623/phpMyAdmin-4.8.1-Remote-Code-Execution.html", }, { type: "WEB", url: "http://www.securityfocus.com/bid/104532", }, ], schema_version: "1.4.0", severity: [ { score: "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", type: "CVSS_V3", }, ], summary: "phpMyAdmin Improper Authentication", }
opensuse-su-2024:11171-1
Vulnerability from csaf_opensuse
Notes
{ document: { aggregate_severity: { namespace: "https://www.suse.com/support/security/rating/", text: "moderate", }, category: "csaf_security_advisory", csaf_version: "2.0", distribution: { text: "Copyright 2024 SUSE LLC. All rights reserved.", tlp: { label: "WHITE", url: "https://www.first.org/tlp/", }, }, lang: "en", notes: [ { category: "summary", text: "phpMyAdmin-5.1.1-1.2 on GA media", title: "Title of the patch", }, { category: "description", text: "These are all security issues fixed in the phpMyAdmin-5.1.1-1.2 package on the GA media of openSUSE Tumbleweed.", title: "Description of the patch", }, { category: "details", text: "openSUSE-Tumbleweed-2024-11171", title: "Patchnames", }, { category: "legal_disclaimer", text: "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).", title: "Terms of use", }, ], publisher: { category: "vendor", contact_details: "https://www.suse.com/support/security/contact/", name: "SUSE Product Security Team", namespace: "https://www.suse.com/", }, references: [ { category: "external", summary: "SUSE ratings", url: "https://www.suse.com/support/security/rating/", }, { category: "self", summary: "URL of this CSAF notice", url: "https://ftp.suse.com/pub/projects/security/csaf/opensuse-su-2024_11171-1.json", }, { category: "self", summary: "SUSE CVE CVE-2005-2869 page", url: "https://www.suse.com/security/cve/CVE-2005-2869/", }, { category: "self", summary: "SUSE CVE CVE-2006-1804 page", url: "https://www.suse.com/security/cve/CVE-2006-1804/", }, { category: "self", summary: "SUSE CVE CVE-2006-2031 page", url: "https://www.suse.com/security/cve/CVE-2006-2031/", }, { category: "self", summary: "SUSE CVE CVE-2015-8980 page", url: "https://www.suse.com/security/cve/CVE-2015-8980/", }, { category: "self", summary: "SUSE CVE CVE-2017-1000013 page", url: "https://www.suse.com/security/cve/CVE-2017-1000013/", }, { category: "self", summary: "SUSE CVE CVE-2017-1000014 page", url: "https://www.suse.com/security/cve/CVE-2017-1000014/", }, { category: "self", summary: "SUSE CVE CVE-2017-1000015 page", url: "https://www.suse.com/security/cve/CVE-2017-1000015/", }, { category: "self", summary: "SUSE CVE CVE-2017-1000016 page", url: "https://www.suse.com/security/cve/CVE-2017-1000016/", }, { category: "self", summary: "SUSE CVE CVE-2017-1000017 page", url: "https://www.suse.com/security/cve/CVE-2017-1000017/", }, { category: "self", summary: "SUSE CVE CVE-2017-1000018 page", url: "https://www.suse.com/security/cve/CVE-2017-1000018/", }, { category: "self", summary: "SUSE CVE CVE-2017-1000499 page", url: "https://www.suse.com/security/cve/CVE-2017-1000499/", }, { category: "self", summary: "SUSE CVE CVE-2018-10188 page", url: "https://www.suse.com/security/cve/CVE-2018-10188/", }, { category: "self", summary: "SUSE CVE CVE-2018-12581 page", url: "https://www.suse.com/security/cve/CVE-2018-12581/", }, { category: "self", summary: "SUSE CVE CVE-2018-12613 page", url: "https://www.suse.com/security/cve/CVE-2018-12613/", }, { category: "self", summary: "SUSE CVE CVE-2018-15605 page", url: "https://www.suse.com/security/cve/CVE-2018-15605/", }, { category: "self", summary: "SUSE CVE CVE-2018-19968 page", url: "https://www.suse.com/security/cve/CVE-2018-19968/", }, { category: "self", summary: "SUSE CVE CVE-2018-19969 page", url: "https://www.suse.com/security/cve/CVE-2018-19969/", }, { category: "self", summary: "SUSE CVE CVE-2018-19970 page", url: "https://www.suse.com/security/cve/CVE-2018-19970/", }, { category: "self", summary: "SUSE CVE CVE-2018-7260 page", url: "https://www.suse.com/security/cve/CVE-2018-7260/", }, { category: "self", summary: "SUSE CVE CVE-2019-11768 page", url: "https://www.suse.com/security/cve/CVE-2019-11768/", }, { category: "self", summary: "SUSE CVE CVE-2019-12616 page", url: "https://www.suse.com/security/cve/CVE-2019-12616/", }, { category: "self", summary: "SUSE CVE CVE-2019-12922 page", url: "https://www.suse.com/security/cve/CVE-2019-12922/", }, { category: "self", summary: "SUSE CVE CVE-2019-18622 page", url: "https://www.suse.com/security/cve/CVE-2019-18622/", }, { category: "self", summary: "SUSE CVE CVE-2019-6798 page", url: "https://www.suse.com/security/cve/CVE-2019-6798/", }, { category: "self", summary: "SUSE CVE CVE-2019-6799 page", url: "https://www.suse.com/security/cve/CVE-2019-6799/", }, { category: "self", summary: "SUSE CVE CVE-2020-10802 page", url: "https://www.suse.com/security/cve/CVE-2020-10802/", }, { category: "self", summary: "SUSE CVE CVE-2020-10803 page", url: "https://www.suse.com/security/cve/CVE-2020-10803/", }, { category: "self", summary: "SUSE CVE CVE-2020-10804 page", url: "https://www.suse.com/security/cve/CVE-2020-10804/", }, { category: "self", summary: "SUSE CVE CVE-2020-26934 page", url: "https://www.suse.com/security/cve/CVE-2020-26934/", }, { category: "self", summary: "SUSE CVE CVE-2020-26935 page", url: "https://www.suse.com/security/cve/CVE-2020-26935/", }, { category: "self", summary: "SUSE CVE CVE-2020-5504 page", url: "https://www.suse.com/security/cve/CVE-2020-5504/", }, ], title: "phpMyAdmin-5.1.1-1.2 on GA media", tracking: { current_release_date: "2024-06-15T00:00:00Z", generator: { date: "2024-06-15T00:00:00Z", engine: { name: "cve-database.git:bin/generate-csaf.pl", version: "1", }, }, id: "openSUSE-SU-2024:11171-1", initial_release_date: "2024-06-15T00:00:00Z", revision_history: [ { date: "2024-06-15T00:00:00Z", number: "1", summary: "Current version", }, ], status: "final", version: "1", }, }, product_tree: { branches: [ { branches: [ { branches: [ { category: "product_version", name: "phpMyAdmin-5.1.1-1.2.aarch64", product: { name: "phpMyAdmin-5.1.1-1.2.aarch64", product_id: "phpMyAdmin-5.1.1-1.2.aarch64", }, }, { category: "product_version", name: "phpMyAdmin-apache-5.1.1-1.2.aarch64", product: { name: "phpMyAdmin-apache-5.1.1-1.2.aarch64", product_id: "phpMyAdmin-apache-5.1.1-1.2.aarch64", }, }, { category: "product_version", name: "phpMyAdmin-lang-5.1.1-1.2.aarch64", product: { name: "phpMyAdmin-lang-5.1.1-1.2.aarch64", product_id: "phpMyAdmin-lang-5.1.1-1.2.aarch64", }, }, ], category: "architecture", name: "aarch64", }, { branches: [ { category: "product_version", name: "phpMyAdmin-5.1.1-1.2.ppc64le", product: { name: "phpMyAdmin-5.1.1-1.2.ppc64le", product_id: "phpMyAdmin-5.1.1-1.2.ppc64le", }, }, { category: "product_version", name: "phpMyAdmin-apache-5.1.1-1.2.ppc64le", product: { name: "phpMyAdmin-apache-5.1.1-1.2.ppc64le", product_id: "phpMyAdmin-apache-5.1.1-1.2.ppc64le", }, }, { category: "product_version", name: "phpMyAdmin-lang-5.1.1-1.2.ppc64le", product: { name: "phpMyAdmin-lang-5.1.1-1.2.ppc64le", product_id: "phpMyAdmin-lang-5.1.1-1.2.ppc64le", }, }, ], category: "architecture", name: "ppc64le", }, { branches: [ { category: "product_version", name: "phpMyAdmin-5.1.1-1.2.s390x", product: { name: "phpMyAdmin-5.1.1-1.2.s390x", product_id: "phpMyAdmin-5.1.1-1.2.s390x", }, }, { category: "product_version", name: "phpMyAdmin-apache-5.1.1-1.2.s390x", product: { name: "phpMyAdmin-apache-5.1.1-1.2.s390x", product_id: "phpMyAdmin-apache-5.1.1-1.2.s390x", }, }, { category: "product_version", name: "phpMyAdmin-lang-5.1.1-1.2.s390x", product: { name: "phpMyAdmin-lang-5.1.1-1.2.s390x", product_id: "phpMyAdmin-lang-5.1.1-1.2.s390x", }, }, ], category: "architecture", name: "s390x", }, { branches: [ { category: "product_version", name: "phpMyAdmin-5.1.1-1.2.x86_64", product: { name: "phpMyAdmin-5.1.1-1.2.x86_64", product_id: "phpMyAdmin-5.1.1-1.2.x86_64", }, }, { category: "product_version", name: "phpMyAdmin-apache-5.1.1-1.2.x86_64", product: { name: "phpMyAdmin-apache-5.1.1-1.2.x86_64", product_id: "phpMyAdmin-apache-5.1.1-1.2.x86_64", }, }, { category: "product_version", name: "phpMyAdmin-lang-5.1.1-1.2.x86_64", product: { name: "phpMyAdmin-lang-5.1.1-1.2.x86_64", product_id: "phpMyAdmin-lang-5.1.1-1.2.x86_64", }, }, ], category: "architecture", name: "x86_64", }, { branches: [ { category: "product_name", name: "openSUSE Tumbleweed", product: { name: "openSUSE Tumbleweed", product_id: "openSUSE Tumbleweed", product_identification_helper: { cpe: "cpe:/o:opensuse:tumbleweed", }, }, }, ], category: "product_family", name: "SUSE Linux Enterprise", }, ], category: "vendor", name: "SUSE", }, ], relationships: [ { category: "default_component_of", full_product_name: { name: "phpMyAdmin-5.1.1-1.2.aarch64 as component of openSUSE Tumbleweed", product_id: "openSUSE Tumbleweed:phpMyAdmin-5.1.1-1.2.aarch64", }, product_reference: "phpMyAdmin-5.1.1-1.2.aarch64", relates_to_product_reference: "openSUSE Tumbleweed", }, { category: "default_component_of", full_product_name: { name: "phpMyAdmin-5.1.1-1.2.ppc64le as component of openSUSE Tumbleweed", product_id: "openSUSE Tumbleweed:phpMyAdmin-5.1.1-1.2.ppc64le", }, product_reference: "phpMyAdmin-5.1.1-1.2.ppc64le", relates_to_product_reference: "openSUSE Tumbleweed", }, { category: "default_component_of", full_product_name: { name: "phpMyAdmin-5.1.1-1.2.s390x as component of openSUSE Tumbleweed", product_id: "openSUSE Tumbleweed:phpMyAdmin-5.1.1-1.2.s390x", }, product_reference: "phpMyAdmin-5.1.1-1.2.s390x", relates_to_product_reference: "openSUSE Tumbleweed", }, { category: "default_component_of", full_product_name: { name: "phpMyAdmin-5.1.1-1.2.x86_64 as component of openSUSE Tumbleweed", product_id: "openSUSE Tumbleweed:phpMyAdmin-5.1.1-1.2.x86_64", }, product_reference: "phpMyAdmin-5.1.1-1.2.x86_64", relates_to_product_reference: "openSUSE Tumbleweed", }, { category: "default_component_of", full_product_name: { name: "phpMyAdmin-apache-5.1.1-1.2.aarch64 as component of openSUSE Tumbleweed", product_id: "openSUSE Tumbleweed:phpMyAdmin-apache-5.1.1-1.2.aarch64", }, product_reference: "phpMyAdmin-apache-5.1.1-1.2.aarch64", relates_to_product_reference: "openSUSE Tumbleweed", }, { category: "default_component_of", full_product_name: { name: "phpMyAdmin-apache-5.1.1-1.2.ppc64le as component of openSUSE Tumbleweed", product_id: "openSUSE Tumbleweed:phpMyAdmin-apache-5.1.1-1.2.ppc64le", }, product_reference: "phpMyAdmin-apache-5.1.1-1.2.ppc64le", relates_to_product_reference: "openSUSE Tumbleweed", }, { category: "default_component_of", full_product_name: { name: "phpMyAdmin-apache-5.1.1-1.2.s390x as component of openSUSE Tumbleweed", product_id: "openSUSE Tumbleweed:phpMyAdmin-apache-5.1.1-1.2.s390x", }, product_reference: "phpMyAdmin-apache-5.1.1-1.2.s390x", relates_to_product_reference: "openSUSE Tumbleweed", }, { category: "default_component_of", full_product_name: { name: "phpMyAdmin-apache-5.1.1-1.2.x86_64 as component of openSUSE Tumbleweed", product_id: "openSUSE Tumbleweed:phpMyAdmin-apache-5.1.1-1.2.x86_64", }, product_reference: "phpMyAdmin-apache-5.1.1-1.2.x86_64", relates_to_product_reference: "openSUSE Tumbleweed", }, { category: "default_component_of", full_product_name: { name: "phpMyAdmin-lang-5.1.1-1.2.aarch64 as component of openSUSE Tumbleweed", product_id: "openSUSE Tumbleweed:phpMyAdmin-lang-5.1.1-1.2.aarch64", }, product_reference: "phpMyAdmin-lang-5.1.1-1.2.aarch64", relates_to_product_reference: "openSUSE Tumbleweed", }, { category: "default_component_of", full_product_name: { name: "phpMyAdmin-lang-5.1.1-1.2.ppc64le as component of openSUSE Tumbleweed", product_id: "openSUSE Tumbleweed:phpMyAdmin-lang-5.1.1-1.2.ppc64le", }, product_reference: "phpMyAdmin-lang-5.1.1-1.2.ppc64le", relates_to_product_reference: "openSUSE Tumbleweed", }, { category: "default_component_of", full_product_name: { name: "phpMyAdmin-lang-5.1.1-1.2.s390x as component of openSUSE Tumbleweed", product_id: "openSUSE Tumbleweed:phpMyAdmin-lang-5.1.1-1.2.s390x", }, product_reference: "phpMyAdmin-lang-5.1.1-1.2.s390x", relates_to_product_reference: "openSUSE Tumbleweed", }, { category: "default_component_of", full_product_name: { name: "phpMyAdmin-lang-5.1.1-1.2.x86_64 as component of openSUSE Tumbleweed", product_id: "openSUSE Tumbleweed:phpMyAdmin-lang-5.1.1-1.2.x86_64", }, product_reference: "phpMyAdmin-lang-5.1.1-1.2.x86_64", relates_to_product_reference: "openSUSE Tumbleweed", }, ], }, vulnerabilities: [ { cve: "CVE-2005-2869", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2005-2869", }, ], notes: [ { category: "general", text: "Multiple cross-site scripting (XSS) vulnerabilities in phpMyAdmin before 2.6.4 allow remote attackers to inject arbitrary web script or HTML via (1) the Username to libraries/auth/cookie.auth.lib.php or (2) the error parameter to error.php.", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Tumbleweed:phpMyAdmin-5.1.1-1.2.aarch64", "openSUSE Tumbleweed:phpMyAdmin-5.1.1-1.2.ppc64le", "openSUSE Tumbleweed:phpMyAdmin-5.1.1-1.2.s390x", "openSUSE Tumbleweed:phpMyAdmin-5.1.1-1.2.x86_64", "openSUSE Tumbleweed:phpMyAdmin-apache-5.1.1-1.2.aarch64", "openSUSE Tumbleweed:phpMyAdmin-apache-5.1.1-1.2.ppc64le", "openSUSE Tumbleweed:phpMyAdmin-apache-5.1.1-1.2.s390x", "openSUSE Tumbleweed:phpMyAdmin-apache-5.1.1-1.2.x86_64", "openSUSE Tumbleweed:phpMyAdmin-lang-5.1.1-1.2.aarch64", "openSUSE Tumbleweed:phpMyAdmin-lang-5.1.1-1.2.ppc64le", "openSUSE Tumbleweed:phpMyAdmin-lang-5.1.1-1.2.s390x", "openSUSE Tumbleweed:phpMyAdmin-lang-5.1.1-1.2.x86_64", ], }, references: [ { category: "external", summary: "CVE-2005-2869", url: "https://www.suse.com/security/cve/CVE-2005-2869", }, { category: "external", summary: "SUSE Bug 130226 for CVE-2005-2869", url: "https://bugzilla.suse.com/130226", }, { category: "external", summary: "SUSE Bug 133818 for CVE-2005-2869", url: "https://bugzilla.suse.com/133818", }, { category: "external", summary: "SUSE Bug 134373 for CVE-2005-2869", url: "https://bugzilla.suse.com/134373", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Tumbleweed:phpMyAdmin-5.1.1-1.2.aarch64", "openSUSE Tumbleweed:phpMyAdmin-5.1.1-1.2.ppc64le", "openSUSE Tumbleweed:phpMyAdmin-5.1.1-1.2.s390x", "openSUSE Tumbleweed:phpMyAdmin-5.1.1-1.2.x86_64", "openSUSE Tumbleweed:phpMyAdmin-apache-5.1.1-1.2.aarch64", "openSUSE Tumbleweed:phpMyAdmin-apache-5.1.1-1.2.ppc64le", "openSUSE Tumbleweed:phpMyAdmin-apache-5.1.1-1.2.s390x", "openSUSE Tumbleweed:phpMyAdmin-apache-5.1.1-1.2.x86_64", "openSUSE Tumbleweed:phpMyAdmin-lang-5.1.1-1.2.aarch64", "openSUSE Tumbleweed:phpMyAdmin-lang-5.1.1-1.2.ppc64le", "openSUSE Tumbleweed:phpMyAdmin-lang-5.1.1-1.2.s390x", "openSUSE Tumbleweed:phpMyAdmin-lang-5.1.1-1.2.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-15T00:00:00Z", details: "important", }, ], title: "CVE-2005-2869", }, { cve: "CVE-2006-1804", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2006-1804", }, ], notes: [ { category: "general", text: "SQL injection vulnerability in sql.php in phpMyAdmin 2.7.0-pl1 allows remote attackers to execute arbitrary SQL commands via the sql_query parameter.", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Tumbleweed:phpMyAdmin-5.1.1-1.2.aarch64", "openSUSE Tumbleweed:phpMyAdmin-5.1.1-1.2.ppc64le", "openSUSE Tumbleweed:phpMyAdmin-5.1.1-1.2.s390x", "openSUSE Tumbleweed:phpMyAdmin-5.1.1-1.2.x86_64", "openSUSE Tumbleweed:phpMyAdmin-apache-5.1.1-1.2.aarch64", "openSUSE Tumbleweed:phpMyAdmin-apache-5.1.1-1.2.ppc64le", "openSUSE Tumbleweed:phpMyAdmin-apache-5.1.1-1.2.s390x", "openSUSE Tumbleweed:phpMyAdmin-apache-5.1.1-1.2.x86_64", "openSUSE Tumbleweed:phpMyAdmin-lang-5.1.1-1.2.aarch64", "openSUSE Tumbleweed:phpMyAdmin-lang-5.1.1-1.2.ppc64le", "openSUSE Tumbleweed:phpMyAdmin-lang-5.1.1-1.2.s390x", "openSUSE Tumbleweed:phpMyAdmin-lang-5.1.1-1.2.x86_64", ], }, references: [ { category: "external", summary: "CVE-2006-1804", url: "https://www.suse.com/security/cve/CVE-2006-1804", }, { category: "external", summary: "SUSE Bug 165772 for CVE-2006-1804", url: "https://bugzilla.suse.com/165772", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Tumbleweed:phpMyAdmin-5.1.1-1.2.aarch64", "openSUSE Tumbleweed:phpMyAdmin-5.1.1-1.2.ppc64le", "openSUSE Tumbleweed:phpMyAdmin-5.1.1-1.2.s390x", "openSUSE Tumbleweed:phpMyAdmin-5.1.1-1.2.x86_64", "openSUSE Tumbleweed:phpMyAdmin-apache-5.1.1-1.2.aarch64", "openSUSE Tumbleweed:phpMyAdmin-apache-5.1.1-1.2.ppc64le", "openSUSE Tumbleweed:phpMyAdmin-apache-5.1.1-1.2.s390x", "openSUSE Tumbleweed:phpMyAdmin-apache-5.1.1-1.2.x86_64", "openSUSE Tumbleweed:phpMyAdmin-lang-5.1.1-1.2.aarch64", "openSUSE Tumbleweed:phpMyAdmin-lang-5.1.1-1.2.ppc64le", "openSUSE Tumbleweed:phpMyAdmin-lang-5.1.1-1.2.s390x", "openSUSE Tumbleweed:phpMyAdmin-lang-5.1.1-1.2.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-15T00:00:00Z", details: "important", }, ], title: "CVE-2006-1804", }, { cve: "CVE-2006-2031", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2006-2031", }, ], notes: [ { category: "general", text: "Cross-site scripting (XSS) vulnerability in index.php in phpMyAdmin 2.8.0.3, 2.8.0.2, 2.8.1-dev, and 2.9.0-dev allows remote attackers to inject arbitrary web script or HTML via the lang parameter.", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Tumbleweed:phpMyAdmin-5.1.1-1.2.aarch64", "openSUSE Tumbleweed:phpMyAdmin-5.1.1-1.2.ppc64le", "openSUSE Tumbleweed:phpMyAdmin-5.1.1-1.2.s390x", "openSUSE Tumbleweed:phpMyAdmin-5.1.1-1.2.x86_64", "openSUSE Tumbleweed:phpMyAdmin-apache-5.1.1-1.2.aarch64", "openSUSE Tumbleweed:phpMyAdmin-apache-5.1.1-1.2.ppc64le", "openSUSE Tumbleweed:phpMyAdmin-apache-5.1.1-1.2.s390x", "openSUSE Tumbleweed:phpMyAdmin-apache-5.1.1-1.2.x86_64", "openSUSE Tumbleweed:phpMyAdmin-lang-5.1.1-1.2.aarch64", "openSUSE Tumbleweed:phpMyAdmin-lang-5.1.1-1.2.ppc64le", "openSUSE Tumbleweed:phpMyAdmin-lang-5.1.1-1.2.s390x", "openSUSE Tumbleweed:phpMyAdmin-lang-5.1.1-1.2.x86_64", ], }, references: [ { category: "external", summary: "CVE-2006-2031", url: "https://www.suse.com/security/cve/CVE-2006-2031", }, { category: "external", summary: "SUSE Bug 170529 for CVE-2006-2031", url: "https://bugzilla.suse.com/170529", }, { category: "external", summary: "SUSE Bug 177091 for CVE-2006-2031", url: "https://bugzilla.suse.com/177091", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Tumbleweed:phpMyAdmin-5.1.1-1.2.aarch64", "openSUSE Tumbleweed:phpMyAdmin-5.1.1-1.2.ppc64le", "openSUSE Tumbleweed:phpMyAdmin-5.1.1-1.2.s390x", "openSUSE Tumbleweed:phpMyAdmin-5.1.1-1.2.x86_64", "openSUSE Tumbleweed:phpMyAdmin-apache-5.1.1-1.2.aarch64", "openSUSE Tumbleweed:phpMyAdmin-apache-5.1.1-1.2.ppc64le", "openSUSE Tumbleweed:phpMyAdmin-apache-5.1.1-1.2.s390x", "openSUSE Tumbleweed:phpMyAdmin-apache-5.1.1-1.2.x86_64", "openSUSE Tumbleweed:phpMyAdmin-lang-5.1.1-1.2.aarch64", "openSUSE Tumbleweed:phpMyAdmin-lang-5.1.1-1.2.ppc64le", "openSUSE Tumbleweed:phpMyAdmin-lang-5.1.1-1.2.s390x", "openSUSE Tumbleweed:phpMyAdmin-lang-5.1.1-1.2.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-15T00:00:00Z", details: "moderate", }, ], title: "CVE-2006-2031", }, { cve: "CVE-2015-8980", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2015-8980", }, ], notes: [ { category: "general", text: "The plural form formula in ngettext family of calls in php-gettext before 1.0.12 allows remote attackers to execute arbitrary code.", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Tumbleweed:phpMyAdmin-5.1.1-1.2.aarch64", "openSUSE Tumbleweed:phpMyAdmin-5.1.1-1.2.ppc64le", "openSUSE Tumbleweed:phpMyAdmin-5.1.1-1.2.s390x", "openSUSE Tumbleweed:phpMyAdmin-5.1.1-1.2.x86_64", "openSUSE Tumbleweed:phpMyAdmin-apache-5.1.1-1.2.aarch64", "openSUSE Tumbleweed:phpMyAdmin-apache-5.1.1-1.2.ppc64le", "openSUSE Tumbleweed:phpMyAdmin-apache-5.1.1-1.2.s390x", "openSUSE Tumbleweed:phpMyAdmin-apache-5.1.1-1.2.x86_64", "openSUSE Tumbleweed:phpMyAdmin-lang-5.1.1-1.2.aarch64", "openSUSE Tumbleweed:phpMyAdmin-lang-5.1.1-1.2.ppc64le", "openSUSE Tumbleweed:phpMyAdmin-lang-5.1.1-1.2.s390x", "openSUSE Tumbleweed:phpMyAdmin-lang-5.1.1-1.2.x86_64", ], }, references: [ { category: "external", summary: "CVE-2015-8980", url: "https://www.suse.com/security/cve/CVE-2015-8980", }, { category: "external", summary: "SUSE Bug 1020489 for CVE-2015-8980", url: "https://bugzilla.suse.com/1020489", }, { category: "external", summary: "SUSE Bug 1021597 for CVE-2015-8980", url: "https://bugzilla.suse.com/1021597", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Tumbleweed:phpMyAdmin-5.1.1-1.2.aarch64", "openSUSE Tumbleweed:phpMyAdmin-5.1.1-1.2.ppc64le", "openSUSE Tumbleweed:phpMyAdmin-5.1.1-1.2.s390x", "openSUSE Tumbleweed:phpMyAdmin-5.1.1-1.2.x86_64", "openSUSE Tumbleweed:phpMyAdmin-apache-5.1.1-1.2.aarch64", "openSUSE Tumbleweed:phpMyAdmin-apache-5.1.1-1.2.ppc64le", "openSUSE Tumbleweed:phpMyAdmin-apache-5.1.1-1.2.s390x", "openSUSE Tumbleweed:phpMyAdmin-apache-5.1.1-1.2.x86_64", "openSUSE Tumbleweed:phpMyAdmin-lang-5.1.1-1.2.aarch64", "openSUSE Tumbleweed:phpMyAdmin-lang-5.1.1-1.2.ppc64le", "openSUSE Tumbleweed:phpMyAdmin-lang-5.1.1-1.2.s390x", "openSUSE Tumbleweed:phpMyAdmin-lang-5.1.1-1.2.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 9.8, baseSeverity: "CRITICAL", vectorString: "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", version: "3.1", }, products: [ "openSUSE Tumbleweed:phpMyAdmin-5.1.1-1.2.aarch64", "openSUSE Tumbleweed:phpMyAdmin-5.1.1-1.2.ppc64le", "openSUSE Tumbleweed:phpMyAdmin-5.1.1-1.2.s390x", "openSUSE Tumbleweed:phpMyAdmin-5.1.1-1.2.x86_64", "openSUSE Tumbleweed:phpMyAdmin-apache-5.1.1-1.2.aarch64", "openSUSE Tumbleweed:phpMyAdmin-apache-5.1.1-1.2.ppc64le", "openSUSE Tumbleweed:phpMyAdmin-apache-5.1.1-1.2.s390x", "openSUSE Tumbleweed:phpMyAdmin-apache-5.1.1-1.2.x86_64", "openSUSE Tumbleweed:phpMyAdmin-lang-5.1.1-1.2.aarch64", "openSUSE Tumbleweed:phpMyAdmin-lang-5.1.1-1.2.ppc64le", "openSUSE Tumbleweed:phpMyAdmin-lang-5.1.1-1.2.s390x", "openSUSE Tumbleweed:phpMyAdmin-lang-5.1.1-1.2.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-15T00:00:00Z", details: "important", }, ], title: "CVE-2015-8980", }, { cve: "CVE-2017-1000013", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2017-1000013", }, ], notes: [ { category: "general", text: "phpMyAdmin 4.0, 4.4, and 4.6 are vulnerable to an open redirect weakness", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Tumbleweed:phpMyAdmin-5.1.1-1.2.aarch64", "openSUSE Tumbleweed:phpMyAdmin-5.1.1-1.2.ppc64le", "openSUSE Tumbleweed:phpMyAdmin-5.1.1-1.2.s390x", "openSUSE Tumbleweed:phpMyAdmin-5.1.1-1.2.x86_64", "openSUSE Tumbleweed:phpMyAdmin-apache-5.1.1-1.2.aarch64", "openSUSE Tumbleweed:phpMyAdmin-apache-5.1.1-1.2.ppc64le", "openSUSE Tumbleweed:phpMyAdmin-apache-5.1.1-1.2.s390x", "openSUSE Tumbleweed:phpMyAdmin-apache-5.1.1-1.2.x86_64", "openSUSE Tumbleweed:phpMyAdmin-lang-5.1.1-1.2.aarch64", "openSUSE Tumbleweed:phpMyAdmin-lang-5.1.1-1.2.ppc64le", "openSUSE Tumbleweed:phpMyAdmin-lang-5.1.1-1.2.s390x", "openSUSE Tumbleweed:phpMyAdmin-lang-5.1.1-1.2.x86_64", ], }, references: [ { category: "external", summary: "CVE-2017-1000013", url: "https://www.suse.com/security/cve/CVE-2017-1000013", }, { category: "external", summary: "SUSE Bug 1021597 for CVE-2017-1000013", url: "https://bugzilla.suse.com/1021597", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Tumbleweed:phpMyAdmin-5.1.1-1.2.aarch64", "openSUSE Tumbleweed:phpMyAdmin-5.1.1-1.2.ppc64le", "openSUSE Tumbleweed:phpMyAdmin-5.1.1-1.2.s390x", "openSUSE Tumbleweed:phpMyAdmin-5.1.1-1.2.x86_64", "openSUSE Tumbleweed:phpMyAdmin-apache-5.1.1-1.2.aarch64", "openSUSE Tumbleweed:phpMyAdmin-apache-5.1.1-1.2.ppc64le", "openSUSE Tumbleweed:phpMyAdmin-apache-5.1.1-1.2.s390x", "openSUSE Tumbleweed:phpMyAdmin-apache-5.1.1-1.2.x86_64", "openSUSE Tumbleweed:phpMyAdmin-lang-5.1.1-1.2.aarch64", "openSUSE Tumbleweed:phpMyAdmin-lang-5.1.1-1.2.ppc64le", "openSUSE Tumbleweed:phpMyAdmin-lang-5.1.1-1.2.s390x", "openSUSE Tumbleweed:phpMyAdmin-lang-5.1.1-1.2.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 6.1, baseSeverity: "MEDIUM", vectorString: "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N", version: "3.0", }, products: [ "openSUSE Tumbleweed:phpMyAdmin-5.1.1-1.2.aarch64", "openSUSE Tumbleweed:phpMyAdmin-5.1.1-1.2.ppc64le", "openSUSE Tumbleweed:phpMyAdmin-5.1.1-1.2.s390x", "openSUSE Tumbleweed:phpMyAdmin-5.1.1-1.2.x86_64", "openSUSE Tumbleweed:phpMyAdmin-apache-5.1.1-1.2.aarch64", "openSUSE Tumbleweed:phpMyAdmin-apache-5.1.1-1.2.ppc64le", "openSUSE Tumbleweed:phpMyAdmin-apache-5.1.1-1.2.s390x", "openSUSE Tumbleweed:phpMyAdmin-apache-5.1.1-1.2.x86_64", "openSUSE Tumbleweed:phpMyAdmin-lang-5.1.1-1.2.aarch64", "openSUSE Tumbleweed:phpMyAdmin-lang-5.1.1-1.2.ppc64le", "openSUSE Tumbleweed:phpMyAdmin-lang-5.1.1-1.2.s390x", "openSUSE Tumbleweed:phpMyAdmin-lang-5.1.1-1.2.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-15T00:00:00Z", details: "moderate", }, ], title: "CVE-2017-1000013", }, { cve: "CVE-2017-1000014", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2017-1000014", }, ], notes: [ { category: "general", text: "phpMyAdmin 4.0, 4.4, and 4.6 are vulnerable to a DOS weakness in the table editing functionality", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Tumbleweed:phpMyAdmin-5.1.1-1.2.aarch64", "openSUSE Tumbleweed:phpMyAdmin-5.1.1-1.2.ppc64le", "openSUSE Tumbleweed:phpMyAdmin-5.1.1-1.2.s390x", "openSUSE Tumbleweed:phpMyAdmin-5.1.1-1.2.x86_64", "openSUSE Tumbleweed:phpMyAdmin-apache-5.1.1-1.2.aarch64", "openSUSE Tumbleweed:phpMyAdmin-apache-5.1.1-1.2.ppc64le", "openSUSE Tumbleweed:phpMyAdmin-apache-5.1.1-1.2.s390x", "openSUSE Tumbleweed:phpMyAdmin-apache-5.1.1-1.2.x86_64", "openSUSE Tumbleweed:phpMyAdmin-lang-5.1.1-1.2.aarch64", "openSUSE Tumbleweed:phpMyAdmin-lang-5.1.1-1.2.ppc64le", "openSUSE Tumbleweed:phpMyAdmin-lang-5.1.1-1.2.s390x", "openSUSE Tumbleweed:phpMyAdmin-lang-5.1.1-1.2.x86_64", ], }, references: [ { category: "external", summary: "CVE-2017-1000014", url: "https://www.suse.com/security/cve/CVE-2017-1000014", }, { category: "external", summary: "SUSE Bug 1021597 for CVE-2017-1000014", url: "https://bugzilla.suse.com/1021597", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Tumbleweed:phpMyAdmin-5.1.1-1.2.aarch64", "openSUSE Tumbleweed:phpMyAdmin-5.1.1-1.2.ppc64le", "openSUSE Tumbleweed:phpMyAdmin-5.1.1-1.2.s390x", "openSUSE Tumbleweed:phpMyAdmin-5.1.1-1.2.x86_64", "openSUSE Tumbleweed:phpMyAdmin-apache-5.1.1-1.2.aarch64", "openSUSE Tumbleweed:phpMyAdmin-apache-5.1.1-1.2.ppc64le", "openSUSE Tumbleweed:phpMyAdmin-apache-5.1.1-1.2.s390x", "openSUSE Tumbleweed:phpMyAdmin-apache-5.1.1-1.2.x86_64", "openSUSE Tumbleweed:phpMyAdmin-lang-5.1.1-1.2.aarch64", "openSUSE Tumbleweed:phpMyAdmin-lang-5.1.1-1.2.ppc64le", "openSUSE Tumbleweed:phpMyAdmin-lang-5.1.1-1.2.s390x", "openSUSE Tumbleweed:phpMyAdmin-lang-5.1.1-1.2.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 7.5, baseSeverity: "HIGH", vectorString: "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", version: "3.0", }, products: [ "openSUSE Tumbleweed:phpMyAdmin-5.1.1-1.2.aarch64", "openSUSE Tumbleweed:phpMyAdmin-5.1.1-1.2.ppc64le", "openSUSE Tumbleweed:phpMyAdmin-5.1.1-1.2.s390x", "openSUSE Tumbleweed:phpMyAdmin-5.1.1-1.2.x86_64", "openSUSE Tumbleweed:phpMyAdmin-apache-5.1.1-1.2.aarch64", "openSUSE Tumbleweed:phpMyAdmin-apache-5.1.1-1.2.ppc64le", "openSUSE Tumbleweed:phpMyAdmin-apache-5.1.1-1.2.s390x", "openSUSE Tumbleweed:phpMyAdmin-apache-5.1.1-1.2.x86_64", "openSUSE Tumbleweed:phpMyAdmin-lang-5.1.1-1.2.aarch64", "openSUSE Tumbleweed:phpMyAdmin-lang-5.1.1-1.2.ppc64le", "openSUSE Tumbleweed:phpMyAdmin-lang-5.1.1-1.2.s390x", "openSUSE Tumbleweed:phpMyAdmin-lang-5.1.1-1.2.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-15T00:00:00Z", details: "moderate", }, ], title: "CVE-2017-1000014", }, { cve: "CVE-2017-1000015", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2017-1000015", }, ], notes: [ { category: "general", text: "phpMyAdmin 4.0, 4.4, and 4.6 are vulnerable to a CSS injection attack through crafted cookie parameters", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Tumbleweed:phpMyAdmin-5.1.1-1.2.aarch64", "openSUSE Tumbleweed:phpMyAdmin-5.1.1-1.2.ppc64le", "openSUSE Tumbleweed:phpMyAdmin-5.1.1-1.2.s390x", "openSUSE Tumbleweed:phpMyAdmin-5.1.1-1.2.x86_64", "openSUSE Tumbleweed:phpMyAdmin-apache-5.1.1-1.2.aarch64", "openSUSE Tumbleweed:phpMyAdmin-apache-5.1.1-1.2.ppc64le", "openSUSE Tumbleweed:phpMyAdmin-apache-5.1.1-1.2.s390x", "openSUSE Tumbleweed:phpMyAdmin-apache-5.1.1-1.2.x86_64", "openSUSE Tumbleweed:phpMyAdmin-lang-5.1.1-1.2.aarch64", "openSUSE Tumbleweed:phpMyAdmin-lang-5.1.1-1.2.ppc64le", "openSUSE Tumbleweed:phpMyAdmin-lang-5.1.1-1.2.s390x", "openSUSE Tumbleweed:phpMyAdmin-lang-5.1.1-1.2.x86_64", ], }, references: [ { category: "external", summary: "CVE-2017-1000015", url: "https://www.suse.com/security/cve/CVE-2017-1000015", }, { category: "external", summary: "SUSE Bug 1021597 for CVE-2017-1000015", url: "https://bugzilla.suse.com/1021597", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Tumbleweed:phpMyAdmin-5.1.1-1.2.aarch64", "openSUSE Tumbleweed:phpMyAdmin-5.1.1-1.2.ppc64le", "openSUSE Tumbleweed:phpMyAdmin-5.1.1-1.2.s390x", "openSUSE Tumbleweed:phpMyAdmin-5.1.1-1.2.x86_64", "openSUSE Tumbleweed:phpMyAdmin-apache-5.1.1-1.2.aarch64", "openSUSE Tumbleweed:phpMyAdmin-apache-5.1.1-1.2.ppc64le", "openSUSE Tumbleweed:phpMyAdmin-apache-5.1.1-1.2.s390x", "openSUSE Tumbleweed:phpMyAdmin-apache-5.1.1-1.2.x86_64", "openSUSE Tumbleweed:phpMyAdmin-lang-5.1.1-1.2.aarch64", "openSUSE Tumbleweed:phpMyAdmin-lang-5.1.1-1.2.ppc64le", "openSUSE Tumbleweed:phpMyAdmin-lang-5.1.1-1.2.s390x", "openSUSE Tumbleweed:phpMyAdmin-lang-5.1.1-1.2.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 6.1, baseSeverity: "MEDIUM", vectorString: "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N", version: "3.0", }, products: [ "openSUSE Tumbleweed:phpMyAdmin-5.1.1-1.2.aarch64", "openSUSE Tumbleweed:phpMyAdmin-5.1.1-1.2.ppc64le", "openSUSE Tumbleweed:phpMyAdmin-5.1.1-1.2.s390x", "openSUSE Tumbleweed:phpMyAdmin-5.1.1-1.2.x86_64", "openSUSE Tumbleweed:phpMyAdmin-apache-5.1.1-1.2.aarch64", "openSUSE Tumbleweed:phpMyAdmin-apache-5.1.1-1.2.ppc64le", "openSUSE Tumbleweed:phpMyAdmin-apache-5.1.1-1.2.s390x", "openSUSE Tumbleweed:phpMyAdmin-apache-5.1.1-1.2.x86_64", "openSUSE Tumbleweed:phpMyAdmin-lang-5.1.1-1.2.aarch64", "openSUSE Tumbleweed:phpMyAdmin-lang-5.1.1-1.2.ppc64le", "openSUSE Tumbleweed:phpMyAdmin-lang-5.1.1-1.2.s390x", "openSUSE Tumbleweed:phpMyAdmin-lang-5.1.1-1.2.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-15T00:00:00Z", details: "moderate", }, ], title: "CVE-2017-1000015", }, { cve: "CVE-2017-1000016", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2017-1000016", }, ], notes: [ { category: "general", text: "A weakness was discovered where an attacker can inject arbitrary values in to the browser cookies. This is a re-issue of an incomplete fix from PMASA-2016-18.", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Tumbleweed:phpMyAdmin-5.1.1-1.2.aarch64", "openSUSE Tumbleweed:phpMyAdmin-5.1.1-1.2.ppc64le", "openSUSE Tumbleweed:phpMyAdmin-5.1.1-1.2.s390x", "openSUSE Tumbleweed:phpMyAdmin-5.1.1-1.2.x86_64", "openSUSE Tumbleweed:phpMyAdmin-apache-5.1.1-1.2.aarch64", "openSUSE Tumbleweed:phpMyAdmin-apache-5.1.1-1.2.ppc64le", "openSUSE Tumbleweed:phpMyAdmin-apache-5.1.1-1.2.s390x", "openSUSE Tumbleweed:phpMyAdmin-apache-5.1.1-1.2.x86_64", "openSUSE Tumbleweed:phpMyAdmin-lang-5.1.1-1.2.aarch64", "openSUSE Tumbleweed:phpMyAdmin-lang-5.1.1-1.2.ppc64le", "openSUSE Tumbleweed:phpMyAdmin-lang-5.1.1-1.2.s390x", "openSUSE Tumbleweed:phpMyAdmin-lang-5.1.1-1.2.x86_64", ], }, references: [ { category: "external", summary: "CVE-2017-1000016", url: "https://www.suse.com/security/cve/CVE-2017-1000016", }, { category: "external", summary: "SUSE Bug 1021597 for CVE-2017-1000016", url: "https://bugzilla.suse.com/1021597", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Tumbleweed:phpMyAdmin-5.1.1-1.2.aarch64", "openSUSE Tumbleweed:phpMyAdmin-5.1.1-1.2.ppc64le", "openSUSE Tumbleweed:phpMyAdmin-5.1.1-1.2.s390x", "openSUSE Tumbleweed:phpMyAdmin-5.1.1-1.2.x86_64", "openSUSE Tumbleweed:phpMyAdmin-apache-5.1.1-1.2.aarch64", "openSUSE Tumbleweed:phpMyAdmin-apache-5.1.1-1.2.ppc64le", "openSUSE Tumbleweed:phpMyAdmin-apache-5.1.1-1.2.s390x", "openSUSE Tumbleweed:phpMyAdmin-apache-5.1.1-1.2.x86_64", "openSUSE Tumbleweed:phpMyAdmin-lang-5.1.1-1.2.aarch64", "openSUSE Tumbleweed:phpMyAdmin-lang-5.1.1-1.2.ppc64le", "openSUSE Tumbleweed:phpMyAdmin-lang-5.1.1-1.2.s390x", "openSUSE Tumbleweed:phpMyAdmin-lang-5.1.1-1.2.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 7.5, baseSeverity: "HIGH", vectorString: "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N", version: "3.0", }, products: [ "openSUSE Tumbleweed:phpMyAdmin-5.1.1-1.2.aarch64", "openSUSE Tumbleweed:phpMyAdmin-5.1.1-1.2.ppc64le", "openSUSE Tumbleweed:phpMyAdmin-5.1.1-1.2.s390x", "openSUSE Tumbleweed:phpMyAdmin-5.1.1-1.2.x86_64", "openSUSE Tumbleweed:phpMyAdmin-apache-5.1.1-1.2.aarch64", "openSUSE Tumbleweed:phpMyAdmin-apache-5.1.1-1.2.ppc64le", "openSUSE Tumbleweed:phpMyAdmin-apache-5.1.1-1.2.s390x", "openSUSE Tumbleweed:phpMyAdmin-apache-5.1.1-1.2.x86_64", "openSUSE Tumbleweed:phpMyAdmin-lang-5.1.1-1.2.aarch64", "openSUSE Tumbleweed:phpMyAdmin-lang-5.1.1-1.2.ppc64le", "openSUSE Tumbleweed:phpMyAdmin-lang-5.1.1-1.2.s390x", "openSUSE Tumbleweed:phpMyAdmin-lang-5.1.1-1.2.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-15T00:00:00Z", details: "moderate", }, ], title: "CVE-2017-1000016", }, { cve: "CVE-2017-1000017", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2017-1000017", }, ], notes: [ { category: "general", text: "phpMyAdmin 4.0, 4.4 and 4.6 are vulnerable to a weakness where a user with appropriate permissions is able to connect to an arbitrary MySQL server", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Tumbleweed:phpMyAdmin-5.1.1-1.2.aarch64", "openSUSE Tumbleweed:phpMyAdmin-5.1.1-1.2.ppc64le", "openSUSE Tumbleweed:phpMyAdmin-5.1.1-1.2.s390x", "openSUSE Tumbleweed:phpMyAdmin-5.1.1-1.2.x86_64", "openSUSE Tumbleweed:phpMyAdmin-apache-5.1.1-1.2.aarch64", "openSUSE Tumbleweed:phpMyAdmin-apache-5.1.1-1.2.ppc64le", "openSUSE Tumbleweed:phpMyAdmin-apache-5.1.1-1.2.s390x", "openSUSE Tumbleweed:phpMyAdmin-apache-5.1.1-1.2.x86_64", "openSUSE Tumbleweed:phpMyAdmin-lang-5.1.1-1.2.aarch64", "openSUSE Tumbleweed:phpMyAdmin-lang-5.1.1-1.2.ppc64le", "openSUSE Tumbleweed:phpMyAdmin-lang-5.1.1-1.2.s390x", "openSUSE Tumbleweed:phpMyAdmin-lang-5.1.1-1.2.x86_64", ], }, references: [ { category: "external", summary: "CVE-2017-1000017", url: "https://www.suse.com/security/cve/CVE-2017-1000017", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Tumbleweed:phpMyAdmin-5.1.1-1.2.aarch64", "openSUSE Tumbleweed:phpMyAdmin-5.1.1-1.2.ppc64le", "openSUSE Tumbleweed:phpMyAdmin-5.1.1-1.2.s390x", "openSUSE Tumbleweed:phpMyAdmin-5.1.1-1.2.x86_64", "openSUSE Tumbleweed:phpMyAdmin-apache-5.1.1-1.2.aarch64", "openSUSE Tumbleweed:phpMyAdmin-apache-5.1.1-1.2.ppc64le", "openSUSE Tumbleweed:phpMyAdmin-apache-5.1.1-1.2.s390x", "openSUSE Tumbleweed:phpMyAdmin-apache-5.1.1-1.2.x86_64", "openSUSE Tumbleweed:phpMyAdmin-lang-5.1.1-1.2.aarch64", "openSUSE Tumbleweed:phpMyAdmin-lang-5.1.1-1.2.ppc64le", "openSUSE Tumbleweed:phpMyAdmin-lang-5.1.1-1.2.s390x", "openSUSE Tumbleweed:phpMyAdmin-lang-5.1.1-1.2.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 8.8, baseSeverity: "HIGH", vectorString: "CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", version: "3.0", }, products: [ "openSUSE Tumbleweed:phpMyAdmin-5.1.1-1.2.aarch64", "openSUSE Tumbleweed:phpMyAdmin-5.1.1-1.2.ppc64le", "openSUSE Tumbleweed:phpMyAdmin-5.1.1-1.2.s390x", "openSUSE Tumbleweed:phpMyAdmin-5.1.1-1.2.x86_64", "openSUSE Tumbleweed:phpMyAdmin-apache-5.1.1-1.2.aarch64", "openSUSE Tumbleweed:phpMyAdmin-apache-5.1.1-1.2.ppc64le", "openSUSE Tumbleweed:phpMyAdmin-apache-5.1.1-1.2.s390x", "openSUSE Tumbleweed:phpMyAdmin-apache-5.1.1-1.2.x86_64", "openSUSE Tumbleweed:phpMyAdmin-lang-5.1.1-1.2.aarch64", "openSUSE Tumbleweed:phpMyAdmin-lang-5.1.1-1.2.ppc64le", "openSUSE Tumbleweed:phpMyAdmin-lang-5.1.1-1.2.s390x", "openSUSE Tumbleweed:phpMyAdmin-lang-5.1.1-1.2.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-15T00:00:00Z", details: "moderate", }, ], title: "CVE-2017-1000017", }, { cve: "CVE-2017-1000018", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2017-1000018", }, ], notes: [ { category: "general", text: "phpMyAdmin 4.0, 4.4., and 4.6 are vulnerable to a DOS attack in the replication status by using a specially crafted table name", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Tumbleweed:phpMyAdmin-5.1.1-1.2.aarch64", "openSUSE Tumbleweed:phpMyAdmin-5.1.1-1.2.ppc64le", "openSUSE Tumbleweed:phpMyAdmin-5.1.1-1.2.s390x", "openSUSE Tumbleweed:phpMyAdmin-5.1.1-1.2.x86_64", "openSUSE Tumbleweed:phpMyAdmin-apache-5.1.1-1.2.aarch64", "openSUSE Tumbleweed:phpMyAdmin-apache-5.1.1-1.2.ppc64le", "openSUSE Tumbleweed:phpMyAdmin-apache-5.1.1-1.2.s390x", "openSUSE Tumbleweed:phpMyAdmin-apache-5.1.1-1.2.x86_64", "openSUSE Tumbleweed:phpMyAdmin-lang-5.1.1-1.2.aarch64", "openSUSE Tumbleweed:phpMyAdmin-lang-5.1.1-1.2.ppc64le", "openSUSE Tumbleweed:phpMyAdmin-lang-5.1.1-1.2.s390x", "openSUSE Tumbleweed:phpMyAdmin-lang-5.1.1-1.2.x86_64", ], }, references: [ { category: "external", summary: "CVE-2017-1000018", url: "https://www.suse.com/security/cve/CVE-2017-1000018", }, { category: "external", summary: "SUSE Bug 1021597 for CVE-2017-1000018", url: "https://bugzilla.suse.com/1021597", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Tumbleweed:phpMyAdmin-5.1.1-1.2.aarch64", "openSUSE Tumbleweed:phpMyAdmin-5.1.1-1.2.ppc64le", "openSUSE Tumbleweed:phpMyAdmin-5.1.1-1.2.s390x", "openSUSE Tumbleweed:phpMyAdmin-5.1.1-1.2.x86_64", "openSUSE Tumbleweed:phpMyAdmin-apache-5.1.1-1.2.aarch64", "openSUSE Tumbleweed:phpMyAdmin-apache-5.1.1-1.2.ppc64le", "openSUSE Tumbleweed:phpMyAdmin-apache-5.1.1-1.2.s390x", "openSUSE Tumbleweed:phpMyAdmin-apache-5.1.1-1.2.x86_64", "openSUSE Tumbleweed:phpMyAdmin-lang-5.1.1-1.2.aarch64", "openSUSE Tumbleweed:phpMyAdmin-lang-5.1.1-1.2.ppc64le", "openSUSE Tumbleweed:phpMyAdmin-lang-5.1.1-1.2.s390x", "openSUSE Tumbleweed:phpMyAdmin-lang-5.1.1-1.2.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 7.5, baseSeverity: "HIGH", vectorString: "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", version: "3.0", }, products: [ "openSUSE Tumbleweed:phpMyAdmin-5.1.1-1.2.aarch64", "openSUSE Tumbleweed:phpMyAdmin-5.1.1-1.2.ppc64le", "openSUSE Tumbleweed:phpMyAdmin-5.1.1-1.2.s390x", "openSUSE Tumbleweed:phpMyAdmin-5.1.1-1.2.x86_64", "openSUSE Tumbleweed:phpMyAdmin-apache-5.1.1-1.2.aarch64", "openSUSE Tumbleweed:phpMyAdmin-apache-5.1.1-1.2.ppc64le", "openSUSE Tumbleweed:phpMyAdmin-apache-5.1.1-1.2.s390x", "openSUSE Tumbleweed:phpMyAdmin-apache-5.1.1-1.2.x86_64", "openSUSE Tumbleweed:phpMyAdmin-lang-5.1.1-1.2.aarch64", "openSUSE Tumbleweed:phpMyAdmin-lang-5.1.1-1.2.ppc64le", "openSUSE Tumbleweed:phpMyAdmin-lang-5.1.1-1.2.s390x", "openSUSE Tumbleweed:phpMyAdmin-lang-5.1.1-1.2.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-15T00:00:00Z", details: "moderate", }, ], title: "CVE-2017-1000018", }, { cve: "CVE-2017-1000499", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2017-1000499", }, ], notes: [ { category: "general", text: "phpMyAdmin versions 4.7.x (prior to 4.7.6.1/4.7.7) are vulnerable to a CSRF weakness. By deceiving a user to click on a crafted URL, it is possible to perform harmful database operations such as deleting records, dropping/truncating tables etc.", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Tumbleweed:phpMyAdmin-5.1.1-1.2.aarch64", "openSUSE Tumbleweed:phpMyAdmin-5.1.1-1.2.ppc64le", "openSUSE Tumbleweed:phpMyAdmin-5.1.1-1.2.s390x", "openSUSE Tumbleweed:phpMyAdmin-5.1.1-1.2.x86_64", "openSUSE Tumbleweed:phpMyAdmin-apache-5.1.1-1.2.aarch64", "openSUSE Tumbleweed:phpMyAdmin-apache-5.1.1-1.2.ppc64le", "openSUSE Tumbleweed:phpMyAdmin-apache-5.1.1-1.2.s390x", "openSUSE Tumbleweed:phpMyAdmin-apache-5.1.1-1.2.x86_64", "openSUSE Tumbleweed:phpMyAdmin-lang-5.1.1-1.2.aarch64", "openSUSE Tumbleweed:phpMyAdmin-lang-5.1.1-1.2.ppc64le", "openSUSE Tumbleweed:phpMyAdmin-lang-5.1.1-1.2.s390x", "openSUSE Tumbleweed:phpMyAdmin-lang-5.1.1-1.2.x86_64", ], }, references: [ { category: "external", summary: "CVE-2017-1000499", url: "https://www.suse.com/security/cve/CVE-2017-1000499", }, { category: "external", summary: "SUSE Bug 1074066 for CVE-2017-1000499", url: "https://bugzilla.suse.com/1074066", }, { category: "external", summary: "SUSE Bug 1075319 for CVE-2017-1000499", url: "https://bugzilla.suse.com/1075319", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Tumbleweed:phpMyAdmin-5.1.1-1.2.aarch64", "openSUSE Tumbleweed:phpMyAdmin-5.1.1-1.2.ppc64le", "openSUSE Tumbleweed:phpMyAdmin-5.1.1-1.2.s390x", "openSUSE Tumbleweed:phpMyAdmin-5.1.1-1.2.x86_64", "openSUSE Tumbleweed:phpMyAdmin-apache-5.1.1-1.2.aarch64", "openSUSE Tumbleweed:phpMyAdmin-apache-5.1.1-1.2.ppc64le", "openSUSE Tumbleweed:phpMyAdmin-apache-5.1.1-1.2.s390x", "openSUSE Tumbleweed:phpMyAdmin-apache-5.1.1-1.2.x86_64", "openSUSE Tumbleweed:phpMyAdmin-lang-5.1.1-1.2.aarch64", "openSUSE Tumbleweed:phpMyAdmin-lang-5.1.1-1.2.ppc64le", "openSUSE Tumbleweed:phpMyAdmin-lang-5.1.1-1.2.s390x", "openSUSE Tumbleweed:phpMyAdmin-lang-5.1.1-1.2.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 8.8, baseSeverity: "HIGH", vectorString: "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", version: "3.0", }, products: [ "openSUSE Tumbleweed:phpMyAdmin-5.1.1-1.2.aarch64", "openSUSE Tumbleweed:phpMyAdmin-5.1.1-1.2.ppc64le", "openSUSE Tumbleweed:phpMyAdmin-5.1.1-1.2.s390x", "openSUSE Tumbleweed:phpMyAdmin-5.1.1-1.2.x86_64", "openSUSE Tumbleweed:phpMyAdmin-apache-5.1.1-1.2.aarch64", "openSUSE Tumbleweed:phpMyAdmin-apache-5.1.1-1.2.ppc64le", "openSUSE Tumbleweed:phpMyAdmin-apache-5.1.1-1.2.s390x", "openSUSE Tumbleweed:phpMyAdmin-apache-5.1.1-1.2.x86_64", "openSUSE Tumbleweed:phpMyAdmin-lang-5.1.1-1.2.aarch64", "openSUSE Tumbleweed:phpMyAdmin-lang-5.1.1-1.2.ppc64le", "openSUSE Tumbleweed:phpMyAdmin-lang-5.1.1-1.2.s390x", "openSUSE Tumbleweed:phpMyAdmin-lang-5.1.1-1.2.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-15T00:00:00Z", details: "moderate", }, ], title: "CVE-2017-1000499", }, { cve: "CVE-2018-10188", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2018-10188", }, ], notes: [ { category: "general", text: "phpMyAdmin 4.8.0 before 4.8.0-1 has CSRF, allowing an attacker to execute arbitrary SQL statements, related to js/db_operations.js, js/tbl_operations.js, libraries/classes/Operations.php, and sql.php.", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Tumbleweed:phpMyAdmin-5.1.1-1.2.aarch64", "openSUSE Tumbleweed:phpMyAdmin-5.1.1-1.2.ppc64le", "openSUSE Tumbleweed:phpMyAdmin-5.1.1-1.2.s390x", "openSUSE Tumbleweed:phpMyAdmin-5.1.1-1.2.x86_64", "openSUSE Tumbleweed:phpMyAdmin-apache-5.1.1-1.2.aarch64", "openSUSE Tumbleweed:phpMyAdmin-apache-5.1.1-1.2.ppc64le", "openSUSE Tumbleweed:phpMyAdmin-apache-5.1.1-1.2.s390x", "openSUSE Tumbleweed:phpMyAdmin-apache-5.1.1-1.2.x86_64", "openSUSE Tumbleweed:phpMyAdmin-lang-5.1.1-1.2.aarch64", "openSUSE Tumbleweed:phpMyAdmin-lang-5.1.1-1.2.ppc64le", "openSUSE Tumbleweed:phpMyAdmin-lang-5.1.1-1.2.s390x", "openSUSE Tumbleweed:phpMyAdmin-lang-5.1.1-1.2.x86_64", ], }, references: [ { category: "external", summary: "CVE-2018-10188", url: "https://www.suse.com/security/cve/CVE-2018-10188", }, { category: "external", summary: "SUSE Bug 1090309 for CVE-2018-10188", url: "https://bugzilla.suse.com/1090309", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Tumbleweed:phpMyAdmin-5.1.1-1.2.aarch64", "openSUSE Tumbleweed:phpMyAdmin-5.1.1-1.2.ppc64le", "openSUSE Tumbleweed:phpMyAdmin-5.1.1-1.2.s390x", "openSUSE Tumbleweed:phpMyAdmin-5.1.1-1.2.x86_64", "openSUSE Tumbleweed:phpMyAdmin-apache-5.1.1-1.2.aarch64", "openSUSE Tumbleweed:phpMyAdmin-apache-5.1.1-1.2.ppc64le", "openSUSE Tumbleweed:phpMyAdmin-apache-5.1.1-1.2.s390x", "openSUSE Tumbleweed:phpMyAdmin-apache-5.1.1-1.2.x86_64", "openSUSE Tumbleweed:phpMyAdmin-lang-5.1.1-1.2.aarch64", "openSUSE Tumbleweed:phpMyAdmin-lang-5.1.1-1.2.ppc64le", "openSUSE Tumbleweed:phpMyAdmin-lang-5.1.1-1.2.s390x", "openSUSE Tumbleweed:phpMyAdmin-lang-5.1.1-1.2.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 8.8, baseSeverity: "HIGH", vectorString: "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", version: "3.0", }, products: [ "openSUSE Tumbleweed:phpMyAdmin-5.1.1-1.2.aarch64", "openSUSE Tumbleweed:phpMyAdmin-5.1.1-1.2.ppc64le", "openSUSE Tumbleweed:phpMyAdmin-5.1.1-1.2.s390x", "openSUSE Tumbleweed:phpMyAdmin-5.1.1-1.2.x86_64", "openSUSE Tumbleweed:phpMyAdmin-apache-5.1.1-1.2.aarch64", "openSUSE Tumbleweed:phpMyAdmin-apache-5.1.1-1.2.ppc64le", "openSUSE Tumbleweed:phpMyAdmin-apache-5.1.1-1.2.s390x", "openSUSE Tumbleweed:phpMyAdmin-apache-5.1.1-1.2.x86_64", "openSUSE Tumbleweed:phpMyAdmin-lang-5.1.1-1.2.aarch64", "openSUSE Tumbleweed:phpMyAdmin-lang-5.1.1-1.2.ppc64le", "openSUSE Tumbleweed:phpMyAdmin-lang-5.1.1-1.2.s390x", "openSUSE Tumbleweed:phpMyAdmin-lang-5.1.1-1.2.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-15T00:00:00Z", details: "moderate", }, ], title: "CVE-2018-10188", }, { cve: "CVE-2018-12581", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2018-12581", }, ], notes: [ { category: "general", text: "An issue was discovered in js/designer/move.js in phpMyAdmin before 4.8.2. A Cross-Site Scripting vulnerability has been found where an attacker can use a crafted database name to trigger an XSS attack when that database is referenced from the Designer feature.", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Tumbleweed:phpMyAdmin-5.1.1-1.2.aarch64", "openSUSE Tumbleweed:phpMyAdmin-5.1.1-1.2.ppc64le", "openSUSE Tumbleweed:phpMyAdmin-5.1.1-1.2.s390x", "openSUSE Tumbleweed:phpMyAdmin-5.1.1-1.2.x86_64", "openSUSE Tumbleweed:phpMyAdmin-apache-5.1.1-1.2.aarch64", "openSUSE Tumbleweed:phpMyAdmin-apache-5.1.1-1.2.ppc64le", "openSUSE Tumbleweed:phpMyAdmin-apache-5.1.1-1.2.s390x", "openSUSE Tumbleweed:phpMyAdmin-apache-5.1.1-1.2.x86_64", "openSUSE Tumbleweed:phpMyAdmin-lang-5.1.1-1.2.aarch64", "openSUSE Tumbleweed:phpMyAdmin-lang-5.1.1-1.2.ppc64le", "openSUSE Tumbleweed:phpMyAdmin-lang-5.1.1-1.2.s390x", "openSUSE Tumbleweed:phpMyAdmin-lang-5.1.1-1.2.x86_64", ], }, references: [ { category: "external", summary: "CVE-2018-12581", url: "https://www.suse.com/security/cve/CVE-2018-12581", }, { category: "external", summary: "SUSE Bug 1098752 for CVE-2018-12581", url: "https://bugzilla.suse.com/1098752", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Tumbleweed:phpMyAdmin-5.1.1-1.2.aarch64", "openSUSE Tumbleweed:phpMyAdmin-5.1.1-1.2.ppc64le", "openSUSE Tumbleweed:phpMyAdmin-5.1.1-1.2.s390x", "openSUSE Tumbleweed:phpMyAdmin-5.1.1-1.2.x86_64", "openSUSE Tumbleweed:phpMyAdmin-apache-5.1.1-1.2.aarch64", "openSUSE Tumbleweed:phpMyAdmin-apache-5.1.1-1.2.ppc64le", "openSUSE Tumbleweed:phpMyAdmin-apache-5.1.1-1.2.s390x", "openSUSE Tumbleweed:phpMyAdmin-apache-5.1.1-1.2.x86_64", "openSUSE Tumbleweed:phpMyAdmin-lang-5.1.1-1.2.aarch64", "openSUSE Tumbleweed:phpMyAdmin-lang-5.1.1-1.2.ppc64le", "openSUSE Tumbleweed:phpMyAdmin-lang-5.1.1-1.2.s390x", "openSUSE Tumbleweed:phpMyAdmin-lang-5.1.1-1.2.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 6.1, baseSeverity: "MEDIUM", vectorString: "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N", version: "3.0", }, products: [ "openSUSE Tumbleweed:phpMyAdmin-5.1.1-1.2.aarch64", "openSUSE Tumbleweed:phpMyAdmin-5.1.1-1.2.ppc64le", "openSUSE Tumbleweed:phpMyAdmin-5.1.1-1.2.s390x", "openSUSE Tumbleweed:phpMyAdmin-5.1.1-1.2.x86_64", "openSUSE Tumbleweed:phpMyAdmin-apache-5.1.1-1.2.aarch64", "openSUSE Tumbleweed:phpMyAdmin-apache-5.1.1-1.2.ppc64le", "openSUSE Tumbleweed:phpMyAdmin-apache-5.1.1-1.2.s390x", "openSUSE Tumbleweed:phpMyAdmin-apache-5.1.1-1.2.x86_64", "openSUSE Tumbleweed:phpMyAdmin-lang-5.1.1-1.2.aarch64", "openSUSE Tumbleweed:phpMyAdmin-lang-5.1.1-1.2.ppc64le", "openSUSE Tumbleweed:phpMyAdmin-lang-5.1.1-1.2.s390x", "openSUSE Tumbleweed:phpMyAdmin-lang-5.1.1-1.2.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-15T00:00:00Z", details: "important", }, ], title: "CVE-2018-12581", }, { cve: "CVE-2018-12613", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2018-12613", }, ], notes: [ { category: "general", text: "An issue was discovered in phpMyAdmin 4.8.x before 4.8.2, in which an attacker can include (view and potentially execute) files on the server. The vulnerability comes from a portion of code where pages are redirected and loaded within phpMyAdmin, and an improper test for whitelisted pages. An attacker must be authenticated, except in the \"$cfg['AllowArbitraryServer'] = true\" case (where an attacker can specify any host he/she is already in control of, and execute arbitrary code on phpMyAdmin) and the \"$cfg['ServerDefault'] = 0\" case (which bypasses the login requirement and runs the vulnerable code without any authentication).", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Tumbleweed:phpMyAdmin-5.1.1-1.2.aarch64", "openSUSE Tumbleweed:phpMyAdmin-5.1.1-1.2.ppc64le", "openSUSE Tumbleweed:phpMyAdmin-5.1.1-1.2.s390x", "openSUSE Tumbleweed:phpMyAdmin-5.1.1-1.2.x86_64", "openSUSE Tumbleweed:phpMyAdmin-apache-5.1.1-1.2.aarch64", "openSUSE Tumbleweed:phpMyAdmin-apache-5.1.1-1.2.ppc64le", "openSUSE Tumbleweed:phpMyAdmin-apache-5.1.1-1.2.s390x", "openSUSE Tumbleweed:phpMyAdmin-apache-5.1.1-1.2.x86_64", "openSUSE Tumbleweed:phpMyAdmin-lang-5.1.1-1.2.aarch64", "openSUSE Tumbleweed:phpMyAdmin-lang-5.1.1-1.2.ppc64le", "openSUSE Tumbleweed:phpMyAdmin-lang-5.1.1-1.2.s390x", "openSUSE Tumbleweed:phpMyAdmin-lang-5.1.1-1.2.x86_64", ], }, references: [ { category: "external", summary: "CVE-2018-12613", url: "https://www.suse.com/security/cve/CVE-2018-12613", }, { category: "external", summary: "SUSE Bug 1098735 for CVE-2018-12613", url: "https://bugzilla.suse.com/1098735", }, { category: "external", summary: "SUSE Bug 1098744 for CVE-2018-12613", url: "https://bugzilla.suse.com/1098744", }, { category: "external", summary: "SUSE Bug 1098751 for CVE-2018-12613", url: "https://bugzilla.suse.com/1098751", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Tumbleweed:phpMyAdmin-5.1.1-1.2.aarch64", "openSUSE Tumbleweed:phpMyAdmin-5.1.1-1.2.ppc64le", "openSUSE Tumbleweed:phpMyAdmin-5.1.1-1.2.s390x", "openSUSE Tumbleweed:phpMyAdmin-5.1.1-1.2.x86_64", "openSUSE Tumbleweed:phpMyAdmin-apache-5.1.1-1.2.aarch64", "openSUSE Tumbleweed:phpMyAdmin-apache-5.1.1-1.2.ppc64le", "openSUSE Tumbleweed:phpMyAdmin-apache-5.1.1-1.2.s390x", "openSUSE Tumbleweed:phpMyAdmin-apache-5.1.1-1.2.x86_64", "openSUSE Tumbleweed:phpMyAdmin-lang-5.1.1-1.2.aarch64", "openSUSE Tumbleweed:phpMyAdmin-lang-5.1.1-1.2.ppc64le", "openSUSE Tumbleweed:phpMyAdmin-lang-5.1.1-1.2.s390x", "openSUSE Tumbleweed:phpMyAdmin-lang-5.1.1-1.2.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 8.8, baseSeverity: "HIGH", vectorString: "CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", version: "3.0", }, products: [ "openSUSE Tumbleweed:phpMyAdmin-5.1.1-1.2.aarch64", "openSUSE Tumbleweed:phpMyAdmin-5.1.1-1.2.ppc64le", "openSUSE Tumbleweed:phpMyAdmin-5.1.1-1.2.s390x", "openSUSE Tumbleweed:phpMyAdmin-5.1.1-1.2.x86_64", "openSUSE Tumbleweed:phpMyAdmin-apache-5.1.1-1.2.aarch64", "openSUSE Tumbleweed:phpMyAdmin-apache-5.1.1-1.2.ppc64le", "openSUSE Tumbleweed:phpMyAdmin-apache-5.1.1-1.2.s390x", "openSUSE Tumbleweed:phpMyAdmin-apache-5.1.1-1.2.x86_64", "openSUSE Tumbleweed:phpMyAdmin-lang-5.1.1-1.2.aarch64", "openSUSE Tumbleweed:phpMyAdmin-lang-5.1.1-1.2.ppc64le", "openSUSE Tumbleweed:phpMyAdmin-lang-5.1.1-1.2.s390x", "openSUSE Tumbleweed:phpMyAdmin-lang-5.1.1-1.2.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-15T00:00:00Z", details: "moderate", }, ], title: "CVE-2018-12613", }, { cve: "CVE-2018-15605", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2018-15605", }, ], notes: [ { category: "general", text: "An issue was discovered in phpMyAdmin before 4.8.3. A Cross-Site Scripting vulnerability has been found where an attacker can use a crafted file to manipulate an authenticated user who loads that file through the import feature.", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Tumbleweed:phpMyAdmin-5.1.1-1.2.aarch64", "openSUSE Tumbleweed:phpMyAdmin-5.1.1-1.2.ppc64le", "openSUSE Tumbleweed:phpMyAdmin-5.1.1-1.2.s390x", "openSUSE Tumbleweed:phpMyAdmin-5.1.1-1.2.x86_64", "openSUSE Tumbleweed:phpMyAdmin-apache-5.1.1-1.2.aarch64", "openSUSE Tumbleweed:phpMyAdmin-apache-5.1.1-1.2.ppc64le", "openSUSE Tumbleweed:phpMyAdmin-apache-5.1.1-1.2.s390x", "openSUSE Tumbleweed:phpMyAdmin-apache-5.1.1-1.2.x86_64", "openSUSE Tumbleweed:phpMyAdmin-lang-5.1.1-1.2.aarch64", "openSUSE Tumbleweed:phpMyAdmin-lang-5.1.1-1.2.ppc64le", "openSUSE Tumbleweed:phpMyAdmin-lang-5.1.1-1.2.s390x", "openSUSE Tumbleweed:phpMyAdmin-lang-5.1.1-1.2.x86_64", ], }, references: [ { category: "external", summary: "CVE-2018-15605", url: "https://www.suse.com/security/cve/CVE-2018-15605", }, { category: "external", summary: "SUSE Bug 1105726 for CVE-2018-15605", url: "https://bugzilla.suse.com/1105726", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Tumbleweed:phpMyAdmin-5.1.1-1.2.aarch64", "openSUSE Tumbleweed:phpMyAdmin-5.1.1-1.2.ppc64le", "openSUSE Tumbleweed:phpMyAdmin-5.1.1-1.2.s390x", "openSUSE Tumbleweed:phpMyAdmin-5.1.1-1.2.x86_64", "openSUSE Tumbleweed:phpMyAdmin-apache-5.1.1-1.2.aarch64", "openSUSE Tumbleweed:phpMyAdmin-apache-5.1.1-1.2.ppc64le", "openSUSE Tumbleweed:phpMyAdmin-apache-5.1.1-1.2.s390x", "openSUSE Tumbleweed:phpMyAdmin-apache-5.1.1-1.2.x86_64", "openSUSE Tumbleweed:phpMyAdmin-lang-5.1.1-1.2.aarch64", "openSUSE Tumbleweed:phpMyAdmin-lang-5.1.1-1.2.ppc64le", "openSUSE Tumbleweed:phpMyAdmin-lang-5.1.1-1.2.s390x", "openSUSE Tumbleweed:phpMyAdmin-lang-5.1.1-1.2.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 6.1, baseSeverity: "MEDIUM", vectorString: "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N", version: "3.0", }, products: [ "openSUSE Tumbleweed:phpMyAdmin-5.1.1-1.2.aarch64", "openSUSE Tumbleweed:phpMyAdmin-5.1.1-1.2.ppc64le", "openSUSE Tumbleweed:phpMyAdmin-5.1.1-1.2.s390x", "openSUSE Tumbleweed:phpMyAdmin-5.1.1-1.2.x86_64", "openSUSE Tumbleweed:phpMyAdmin-apache-5.1.1-1.2.aarch64", "openSUSE Tumbleweed:phpMyAdmin-apache-5.1.1-1.2.ppc64le", "openSUSE Tumbleweed:phpMyAdmin-apache-5.1.1-1.2.s390x", "openSUSE Tumbleweed:phpMyAdmin-apache-5.1.1-1.2.x86_64", "openSUSE Tumbleweed:phpMyAdmin-lang-5.1.1-1.2.aarch64", "openSUSE Tumbleweed:phpMyAdmin-lang-5.1.1-1.2.ppc64le", "openSUSE Tumbleweed:phpMyAdmin-lang-5.1.1-1.2.s390x", "openSUSE Tumbleweed:phpMyAdmin-lang-5.1.1-1.2.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-15T00:00:00Z", details: "important", }, ], title: "CVE-2018-15605", }, { cve: "CVE-2018-19968", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2018-19968", }, ], notes: [ { category: "general", text: "An attacker can exploit phpMyAdmin before 4.8.4 to leak the contents of a local file because of an error in the transformation feature. The attacker must have access to the phpMyAdmin Configuration Storage tables, although these can easily be created in any database to which the attacker has access. An attacker must have valid credentials to log in to phpMyAdmin; this vulnerability does not allow an attacker to circumvent the login system.", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Tumbleweed:phpMyAdmin-5.1.1-1.2.aarch64", "openSUSE Tumbleweed:phpMyAdmin-5.1.1-1.2.ppc64le", "openSUSE Tumbleweed:phpMyAdmin-5.1.1-1.2.s390x", "openSUSE Tumbleweed:phpMyAdmin-5.1.1-1.2.x86_64", "openSUSE Tumbleweed:phpMyAdmin-apache-5.1.1-1.2.aarch64", "openSUSE Tumbleweed:phpMyAdmin-apache-5.1.1-1.2.ppc64le", "openSUSE Tumbleweed:phpMyAdmin-apache-5.1.1-1.2.s390x", "openSUSE Tumbleweed:phpMyAdmin-apache-5.1.1-1.2.x86_64", "openSUSE Tumbleweed:phpMyAdmin-lang-5.1.1-1.2.aarch64", "openSUSE Tumbleweed:phpMyAdmin-lang-5.1.1-1.2.ppc64le", "openSUSE Tumbleweed:phpMyAdmin-lang-5.1.1-1.2.s390x", "openSUSE Tumbleweed:phpMyAdmin-lang-5.1.1-1.2.x86_64", ], }, references: [ { category: "external", summary: "CVE-2018-19968", url: "https://www.suse.com/security/cve/CVE-2018-19968", }, { category: "external", summary: "SUSE Bug 1119245 for CVE-2018-19968", url: "https://bugzilla.suse.com/1119245", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Tumbleweed:phpMyAdmin-5.1.1-1.2.aarch64", "openSUSE Tumbleweed:phpMyAdmin-5.1.1-1.2.ppc64le", "openSUSE Tumbleweed:phpMyAdmin-5.1.1-1.2.s390x", "openSUSE Tumbleweed:phpMyAdmin-5.1.1-1.2.x86_64", "openSUSE Tumbleweed:phpMyAdmin-apache-5.1.1-1.2.aarch64", "openSUSE Tumbleweed:phpMyAdmin-apache-5.1.1-1.2.ppc64le", "openSUSE Tumbleweed:phpMyAdmin-apache-5.1.1-1.2.s390x", "openSUSE Tumbleweed:phpMyAdmin-apache-5.1.1-1.2.x86_64", "openSUSE Tumbleweed:phpMyAdmin-lang-5.1.1-1.2.aarch64", "openSUSE Tumbleweed:phpMyAdmin-lang-5.1.1-1.2.ppc64le", "openSUSE Tumbleweed:phpMyAdmin-lang-5.1.1-1.2.s390x", "openSUSE Tumbleweed:phpMyAdmin-lang-5.1.1-1.2.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 6.5, baseSeverity: "MEDIUM", vectorString: "CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N", version: "3.0", }, products: [ "openSUSE Tumbleweed:phpMyAdmin-5.1.1-1.2.aarch64", "openSUSE Tumbleweed:phpMyAdmin-5.1.1-1.2.ppc64le", "openSUSE Tumbleweed:phpMyAdmin-5.1.1-1.2.s390x", "openSUSE Tumbleweed:phpMyAdmin-5.1.1-1.2.x86_64", "openSUSE Tumbleweed:phpMyAdmin-apache-5.1.1-1.2.aarch64", "openSUSE Tumbleweed:phpMyAdmin-apache-5.1.1-1.2.ppc64le", "openSUSE Tumbleweed:phpMyAdmin-apache-5.1.1-1.2.s390x", "openSUSE Tumbleweed:phpMyAdmin-apache-5.1.1-1.2.x86_64", "openSUSE Tumbleweed:phpMyAdmin-lang-5.1.1-1.2.aarch64", "openSUSE Tumbleweed:phpMyAdmin-lang-5.1.1-1.2.ppc64le", "openSUSE Tumbleweed:phpMyAdmin-lang-5.1.1-1.2.s390x", "openSUSE Tumbleweed:phpMyAdmin-lang-5.1.1-1.2.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-15T00:00:00Z", details: "moderate", }, ], title: "CVE-2018-19968", }, { cve: "CVE-2018-19969", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2018-19969", }, ], notes: [ { category: "general", text: "phpMyAdmin 4.7.x and 4.8.x versions prior to 4.8.4 are affected by a series of CSRF flaws. By deceiving a user into clicking on a crafted URL, it is possible to perform harmful SQL operations such as renaming databases, creating new tables/routines, deleting designer pages, adding/deleting users, updating user passwords, killing SQL processes, etc.", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Tumbleweed:phpMyAdmin-5.1.1-1.2.aarch64", "openSUSE Tumbleweed:phpMyAdmin-5.1.1-1.2.ppc64le", "openSUSE Tumbleweed:phpMyAdmin-5.1.1-1.2.s390x", "openSUSE Tumbleweed:phpMyAdmin-5.1.1-1.2.x86_64", "openSUSE Tumbleweed:phpMyAdmin-apache-5.1.1-1.2.aarch64", "openSUSE Tumbleweed:phpMyAdmin-apache-5.1.1-1.2.ppc64le", "openSUSE Tumbleweed:phpMyAdmin-apache-5.1.1-1.2.s390x", "openSUSE Tumbleweed:phpMyAdmin-apache-5.1.1-1.2.x86_64", "openSUSE Tumbleweed:phpMyAdmin-lang-5.1.1-1.2.aarch64", "openSUSE Tumbleweed:phpMyAdmin-lang-5.1.1-1.2.ppc64le", "openSUSE Tumbleweed:phpMyAdmin-lang-5.1.1-1.2.s390x", "openSUSE Tumbleweed:phpMyAdmin-lang-5.1.1-1.2.x86_64", ], }, references: [ { category: "external", summary: "CVE-2018-19969", url: "https://www.suse.com/security/cve/CVE-2018-19969", }, { category: "external", summary: "SUSE Bug 1119245 for CVE-2018-19969", url: "https://bugzilla.suse.com/1119245", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Tumbleweed:phpMyAdmin-5.1.1-1.2.aarch64", "openSUSE Tumbleweed:phpMyAdmin-5.1.1-1.2.ppc64le", "openSUSE Tumbleweed:phpMyAdmin-5.1.1-1.2.s390x", "openSUSE Tumbleweed:phpMyAdmin-5.1.1-1.2.x86_64", "openSUSE Tumbleweed:phpMyAdmin-apache-5.1.1-1.2.aarch64", "openSUSE Tumbleweed:phpMyAdmin-apache-5.1.1-1.2.ppc64le", "openSUSE Tumbleweed:phpMyAdmin-apache-5.1.1-1.2.s390x", "openSUSE Tumbleweed:phpMyAdmin-apache-5.1.1-1.2.x86_64", "openSUSE Tumbleweed:phpMyAdmin-lang-5.1.1-1.2.aarch64", "openSUSE Tumbleweed:phpMyAdmin-lang-5.1.1-1.2.ppc64le", "openSUSE Tumbleweed:phpMyAdmin-lang-5.1.1-1.2.s390x", "openSUSE Tumbleweed:phpMyAdmin-lang-5.1.1-1.2.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 8.8, baseSeverity: "HIGH", vectorString: "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", version: "3.0", }, products: [ "openSUSE Tumbleweed:phpMyAdmin-5.1.1-1.2.aarch64", "openSUSE Tumbleweed:phpMyAdmin-5.1.1-1.2.ppc64le", "openSUSE Tumbleweed:phpMyAdmin-5.1.1-1.2.s390x", "openSUSE Tumbleweed:phpMyAdmin-5.1.1-1.2.x86_64", "openSUSE Tumbleweed:phpMyAdmin-apache-5.1.1-1.2.aarch64", "openSUSE Tumbleweed:phpMyAdmin-apache-5.1.1-1.2.ppc64le", "openSUSE Tumbleweed:phpMyAdmin-apache-5.1.1-1.2.s390x", "openSUSE Tumbleweed:phpMyAdmin-apache-5.1.1-1.2.x86_64", "openSUSE Tumbleweed:phpMyAdmin-lang-5.1.1-1.2.aarch64", "openSUSE Tumbleweed:phpMyAdmin-lang-5.1.1-1.2.ppc64le", "openSUSE Tumbleweed:phpMyAdmin-lang-5.1.1-1.2.s390x", "openSUSE Tumbleweed:phpMyAdmin-lang-5.1.1-1.2.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-15T00:00:00Z", details: "moderate", }, ], title: "CVE-2018-19969", }, { cve: "CVE-2018-19970", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2018-19970", }, ], notes: [ { category: "general", text: "In phpMyAdmin before 4.8.4, an XSS vulnerability was found in the navigation tree, where an attacker can deliver a payload to a user through a crafted database/table name.", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Tumbleweed:phpMyAdmin-5.1.1-1.2.aarch64", "openSUSE Tumbleweed:phpMyAdmin-5.1.1-1.2.ppc64le", "openSUSE Tumbleweed:phpMyAdmin-5.1.1-1.2.s390x", "openSUSE Tumbleweed:phpMyAdmin-5.1.1-1.2.x86_64", "openSUSE Tumbleweed:phpMyAdmin-apache-5.1.1-1.2.aarch64", "openSUSE Tumbleweed:phpMyAdmin-apache-5.1.1-1.2.ppc64le", "openSUSE Tumbleweed:phpMyAdmin-apache-5.1.1-1.2.s390x", "openSUSE Tumbleweed:phpMyAdmin-apache-5.1.1-1.2.x86_64", "openSUSE Tumbleweed:phpMyAdmin-lang-5.1.1-1.2.aarch64", "openSUSE Tumbleweed:phpMyAdmin-lang-5.1.1-1.2.ppc64le", "openSUSE Tumbleweed:phpMyAdmin-lang-5.1.1-1.2.s390x", "openSUSE Tumbleweed:phpMyAdmin-lang-5.1.1-1.2.x86_64", ], }, references: [ { category: "external", summary: "CVE-2018-19970", url: "https://www.suse.com/security/cve/CVE-2018-19970", }, { category: "external", summary: "SUSE Bug 1119245 for CVE-2018-19970", url: "https://bugzilla.suse.com/1119245", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Tumbleweed:phpMyAdmin-5.1.1-1.2.aarch64", "openSUSE Tumbleweed:phpMyAdmin-5.1.1-1.2.ppc64le", "openSUSE Tumbleweed:phpMyAdmin-5.1.1-1.2.s390x", "openSUSE Tumbleweed:phpMyAdmin-5.1.1-1.2.x86_64", "openSUSE Tumbleweed:phpMyAdmin-apache-5.1.1-1.2.aarch64", "openSUSE Tumbleweed:phpMyAdmin-apache-5.1.1-1.2.ppc64le", "openSUSE Tumbleweed:phpMyAdmin-apache-5.1.1-1.2.s390x", "openSUSE Tumbleweed:phpMyAdmin-apache-5.1.1-1.2.x86_64", "openSUSE Tumbleweed:phpMyAdmin-lang-5.1.1-1.2.aarch64", "openSUSE Tumbleweed:phpMyAdmin-lang-5.1.1-1.2.ppc64le", "openSUSE Tumbleweed:phpMyAdmin-lang-5.1.1-1.2.s390x", "openSUSE Tumbleweed:phpMyAdmin-lang-5.1.1-1.2.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 6.1, baseSeverity: "MEDIUM", vectorString: "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N", version: "3.0", }, products: [ "openSUSE Tumbleweed:phpMyAdmin-5.1.1-1.2.aarch64", "openSUSE Tumbleweed:phpMyAdmin-5.1.1-1.2.ppc64le", "openSUSE Tumbleweed:phpMyAdmin-5.1.1-1.2.s390x", "openSUSE Tumbleweed:phpMyAdmin-5.1.1-1.2.x86_64", "openSUSE Tumbleweed:phpMyAdmin-apache-5.1.1-1.2.aarch64", "openSUSE Tumbleweed:phpMyAdmin-apache-5.1.1-1.2.ppc64le", "openSUSE Tumbleweed:phpMyAdmin-apache-5.1.1-1.2.s390x", "openSUSE Tumbleweed:phpMyAdmin-apache-5.1.1-1.2.x86_64", "openSUSE Tumbleweed:phpMyAdmin-lang-5.1.1-1.2.aarch64", "openSUSE Tumbleweed:phpMyAdmin-lang-5.1.1-1.2.ppc64le", "openSUSE Tumbleweed:phpMyAdmin-lang-5.1.1-1.2.s390x", "openSUSE Tumbleweed:phpMyAdmin-lang-5.1.1-1.2.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-15T00:00:00Z", details: "moderate", }, ], title: "CVE-2018-19970", }, { cve: "CVE-2018-7260", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2018-7260", }, ], notes: [ { category: "general", text: "Cross-site scripting (XSS) vulnerability in db_central_columns.php in phpMyAdmin before 4.7.8 allows remote authenticated users to inject arbitrary web script or HTML via a crafted URL.", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Tumbleweed:phpMyAdmin-5.1.1-1.2.aarch64", "openSUSE Tumbleweed:phpMyAdmin-5.1.1-1.2.ppc64le", "openSUSE Tumbleweed:phpMyAdmin-5.1.1-1.2.s390x", "openSUSE Tumbleweed:phpMyAdmin-5.1.1-1.2.x86_64", "openSUSE Tumbleweed:phpMyAdmin-apache-5.1.1-1.2.aarch64", "openSUSE Tumbleweed:phpMyAdmin-apache-5.1.1-1.2.ppc64le", "openSUSE Tumbleweed:phpMyAdmin-apache-5.1.1-1.2.s390x", "openSUSE Tumbleweed:phpMyAdmin-apache-5.1.1-1.2.x86_64", "openSUSE Tumbleweed:phpMyAdmin-lang-5.1.1-1.2.aarch64", "openSUSE Tumbleweed:phpMyAdmin-lang-5.1.1-1.2.ppc64le", "openSUSE Tumbleweed:phpMyAdmin-lang-5.1.1-1.2.s390x", "openSUSE Tumbleweed:phpMyAdmin-lang-5.1.1-1.2.x86_64", ], }, references: [ { category: "external", summary: "CVE-2018-7260", url: "https://www.suse.com/security/cve/CVE-2018-7260", }, { category: "external", summary: "SUSE Bug 1082188 for CVE-2018-7260", url: "https://bugzilla.suse.com/1082188", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Tumbleweed:phpMyAdmin-5.1.1-1.2.aarch64", "openSUSE Tumbleweed:phpMyAdmin-5.1.1-1.2.ppc64le", "openSUSE Tumbleweed:phpMyAdmin-5.1.1-1.2.s390x", "openSUSE Tumbleweed:phpMyAdmin-5.1.1-1.2.x86_64", "openSUSE Tumbleweed:phpMyAdmin-apache-5.1.1-1.2.aarch64", "openSUSE Tumbleweed:phpMyAdmin-apache-5.1.1-1.2.ppc64le", "openSUSE Tumbleweed:phpMyAdmin-apache-5.1.1-1.2.s390x", "openSUSE Tumbleweed:phpMyAdmin-apache-5.1.1-1.2.x86_64", "openSUSE Tumbleweed:phpMyAdmin-lang-5.1.1-1.2.aarch64", "openSUSE Tumbleweed:phpMyAdmin-lang-5.1.1-1.2.ppc64le", "openSUSE Tumbleweed:phpMyAdmin-lang-5.1.1-1.2.s390x", "openSUSE Tumbleweed:phpMyAdmin-lang-5.1.1-1.2.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 5.4, baseSeverity: "MEDIUM", vectorString: "CVSS:3.0/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N", version: "3.0", }, products: [ "openSUSE Tumbleweed:phpMyAdmin-5.1.1-1.2.aarch64", "openSUSE Tumbleweed:phpMyAdmin-5.1.1-1.2.ppc64le", "openSUSE Tumbleweed:phpMyAdmin-5.1.1-1.2.s390x", "openSUSE Tumbleweed:phpMyAdmin-5.1.1-1.2.x86_64", "openSUSE Tumbleweed:phpMyAdmin-apache-5.1.1-1.2.aarch64", "openSUSE Tumbleweed:phpMyAdmin-apache-5.1.1-1.2.ppc64le", "openSUSE Tumbleweed:phpMyAdmin-apache-5.1.1-1.2.s390x", "openSUSE Tumbleweed:phpMyAdmin-apache-5.1.1-1.2.x86_64", "openSUSE Tumbleweed:phpMyAdmin-lang-5.1.1-1.2.aarch64", "openSUSE Tumbleweed:phpMyAdmin-lang-5.1.1-1.2.ppc64le", "openSUSE Tumbleweed:phpMyAdmin-lang-5.1.1-1.2.s390x", "openSUSE Tumbleweed:phpMyAdmin-lang-5.1.1-1.2.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-15T00:00:00Z", details: "important", }, ], title: "CVE-2018-7260", }, { cve: "CVE-2019-11768", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2019-11768", }, ], notes: [ { category: "general", text: "An issue was discovered in phpMyAdmin before 4.9.0.1. A vulnerability was reported where a specially crafted database name can be used to trigger an SQL injection attack through the designer feature.", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Tumbleweed:phpMyAdmin-5.1.1-1.2.aarch64", "openSUSE Tumbleweed:phpMyAdmin-5.1.1-1.2.ppc64le", "openSUSE Tumbleweed:phpMyAdmin-5.1.1-1.2.s390x", "openSUSE Tumbleweed:phpMyAdmin-5.1.1-1.2.x86_64", "openSUSE Tumbleweed:phpMyAdmin-apache-5.1.1-1.2.aarch64", "openSUSE Tumbleweed:phpMyAdmin-apache-5.1.1-1.2.ppc64le", "openSUSE Tumbleweed:phpMyAdmin-apache-5.1.1-1.2.s390x", "openSUSE Tumbleweed:phpMyAdmin-apache-5.1.1-1.2.x86_64", "openSUSE Tumbleweed:phpMyAdmin-lang-5.1.1-1.2.aarch64", "openSUSE Tumbleweed:phpMyAdmin-lang-5.1.1-1.2.ppc64le", "openSUSE Tumbleweed:phpMyAdmin-lang-5.1.1-1.2.s390x", "openSUSE Tumbleweed:phpMyAdmin-lang-5.1.1-1.2.x86_64", ], }, references: [ { category: "external", summary: "CVE-2019-11768", url: "https://www.suse.com/security/cve/CVE-2019-11768", }, { category: "external", summary: "SUSE Bug 1137496 for CVE-2019-11768", url: "https://bugzilla.suse.com/1137496", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Tumbleweed:phpMyAdmin-5.1.1-1.2.aarch64", "openSUSE Tumbleweed:phpMyAdmin-5.1.1-1.2.ppc64le", "openSUSE Tumbleweed:phpMyAdmin-5.1.1-1.2.s390x", "openSUSE Tumbleweed:phpMyAdmin-5.1.1-1.2.x86_64", "openSUSE Tumbleweed:phpMyAdmin-apache-5.1.1-1.2.aarch64", "openSUSE Tumbleweed:phpMyAdmin-apache-5.1.1-1.2.ppc64le", "openSUSE Tumbleweed:phpMyAdmin-apache-5.1.1-1.2.s390x", "openSUSE Tumbleweed:phpMyAdmin-apache-5.1.1-1.2.x86_64", "openSUSE Tumbleweed:phpMyAdmin-lang-5.1.1-1.2.aarch64", "openSUSE Tumbleweed:phpMyAdmin-lang-5.1.1-1.2.ppc64le", "openSUSE Tumbleweed:phpMyAdmin-lang-5.1.1-1.2.s390x", "openSUSE Tumbleweed:phpMyAdmin-lang-5.1.1-1.2.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 9.8, baseSeverity: "CRITICAL", vectorString: "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", version: "3.0", }, products: [ "openSUSE Tumbleweed:phpMyAdmin-5.1.1-1.2.aarch64", "openSUSE Tumbleweed:phpMyAdmin-5.1.1-1.2.ppc64le", "openSUSE Tumbleweed:phpMyAdmin-5.1.1-1.2.s390x", "openSUSE Tumbleweed:phpMyAdmin-5.1.1-1.2.x86_64", "openSUSE Tumbleweed:phpMyAdmin-apache-5.1.1-1.2.aarch64", "openSUSE Tumbleweed:phpMyAdmin-apache-5.1.1-1.2.ppc64le", "openSUSE Tumbleweed:phpMyAdmin-apache-5.1.1-1.2.s390x", "openSUSE Tumbleweed:phpMyAdmin-apache-5.1.1-1.2.x86_64", "openSUSE Tumbleweed:phpMyAdmin-lang-5.1.1-1.2.aarch64", "openSUSE Tumbleweed:phpMyAdmin-lang-5.1.1-1.2.ppc64le", "openSUSE Tumbleweed:phpMyAdmin-lang-5.1.1-1.2.s390x", "openSUSE Tumbleweed:phpMyAdmin-lang-5.1.1-1.2.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-15T00:00:00Z", details: "moderate", }, ], title: "CVE-2019-11768", }, { cve: "CVE-2019-12616", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2019-12616", }, ], notes: [ { category: "general", text: "An issue was discovered in phpMyAdmin before 4.9.0. A vulnerability was found that allows an attacker to trigger a CSRF attack against a phpMyAdmin user. The attacker can trick the user, for instance through a broken <img> tag pointing at the victim's phpMyAdmin database, and the attacker can potentially deliver a payload (such as a specific INSERT or DELETE statement) to the victim.", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Tumbleweed:phpMyAdmin-5.1.1-1.2.aarch64", "openSUSE Tumbleweed:phpMyAdmin-5.1.1-1.2.ppc64le", "openSUSE Tumbleweed:phpMyAdmin-5.1.1-1.2.s390x", "openSUSE Tumbleweed:phpMyAdmin-5.1.1-1.2.x86_64", "openSUSE Tumbleweed:phpMyAdmin-apache-5.1.1-1.2.aarch64", "openSUSE Tumbleweed:phpMyAdmin-apache-5.1.1-1.2.ppc64le", "openSUSE Tumbleweed:phpMyAdmin-apache-5.1.1-1.2.s390x", "openSUSE Tumbleweed:phpMyAdmin-apache-5.1.1-1.2.x86_64", "openSUSE Tumbleweed:phpMyAdmin-lang-5.1.1-1.2.aarch64", "openSUSE Tumbleweed:phpMyAdmin-lang-5.1.1-1.2.ppc64le", "openSUSE Tumbleweed:phpMyAdmin-lang-5.1.1-1.2.s390x", "openSUSE Tumbleweed:phpMyAdmin-lang-5.1.1-1.2.x86_64", ], }, references: [ { category: "external", summary: "CVE-2019-12616", url: "https://www.suse.com/security/cve/CVE-2019-12616", }, { category: "external", summary: "SUSE Bug 1137497 for CVE-2019-12616", url: "https://bugzilla.suse.com/1137497", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Tumbleweed:phpMyAdmin-5.1.1-1.2.aarch64", "openSUSE Tumbleweed:phpMyAdmin-5.1.1-1.2.ppc64le", "openSUSE Tumbleweed:phpMyAdmin-5.1.1-1.2.s390x", "openSUSE Tumbleweed:phpMyAdmin-5.1.1-1.2.x86_64", "openSUSE Tumbleweed:phpMyAdmin-apache-5.1.1-1.2.aarch64", "openSUSE Tumbleweed:phpMyAdmin-apache-5.1.1-1.2.ppc64le", "openSUSE Tumbleweed:phpMyAdmin-apache-5.1.1-1.2.s390x", "openSUSE Tumbleweed:phpMyAdmin-apache-5.1.1-1.2.x86_64", "openSUSE Tumbleweed:phpMyAdmin-lang-5.1.1-1.2.aarch64", "openSUSE Tumbleweed:phpMyAdmin-lang-5.1.1-1.2.ppc64le", "openSUSE Tumbleweed:phpMyAdmin-lang-5.1.1-1.2.s390x", "openSUSE Tumbleweed:phpMyAdmin-lang-5.1.1-1.2.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 6.5, baseSeverity: "MEDIUM", vectorString: "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N", version: "3.0", }, products: [ "openSUSE Tumbleweed:phpMyAdmin-5.1.1-1.2.aarch64", "openSUSE Tumbleweed:phpMyAdmin-5.1.1-1.2.ppc64le", "openSUSE Tumbleweed:phpMyAdmin-5.1.1-1.2.s390x", "openSUSE Tumbleweed:phpMyAdmin-5.1.1-1.2.x86_64", "openSUSE Tumbleweed:phpMyAdmin-apache-5.1.1-1.2.aarch64", "openSUSE Tumbleweed:phpMyAdmin-apache-5.1.1-1.2.ppc64le", "openSUSE Tumbleweed:phpMyAdmin-apache-5.1.1-1.2.s390x", "openSUSE Tumbleweed:phpMyAdmin-apache-5.1.1-1.2.x86_64", "openSUSE Tumbleweed:phpMyAdmin-lang-5.1.1-1.2.aarch64", "openSUSE Tumbleweed:phpMyAdmin-lang-5.1.1-1.2.ppc64le", "openSUSE Tumbleweed:phpMyAdmin-lang-5.1.1-1.2.s390x", "openSUSE Tumbleweed:phpMyAdmin-lang-5.1.1-1.2.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-15T00:00:00Z", details: "moderate", }, ], title: "CVE-2019-12616", }, { cve: "CVE-2019-12922", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2019-12922", }, ], notes: [ { category: "general", text: "A CSRF issue in phpMyAdmin 4.9.0.1 allows deletion of any server in the Setup page.", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Tumbleweed:phpMyAdmin-5.1.1-1.2.aarch64", "openSUSE Tumbleweed:phpMyAdmin-5.1.1-1.2.ppc64le", "openSUSE Tumbleweed:phpMyAdmin-5.1.1-1.2.s390x", "openSUSE Tumbleweed:phpMyAdmin-5.1.1-1.2.x86_64", "openSUSE Tumbleweed:phpMyAdmin-apache-5.1.1-1.2.aarch64", "openSUSE Tumbleweed:phpMyAdmin-apache-5.1.1-1.2.ppc64le", "openSUSE Tumbleweed:phpMyAdmin-apache-5.1.1-1.2.s390x", "openSUSE Tumbleweed:phpMyAdmin-apache-5.1.1-1.2.x86_64", "openSUSE Tumbleweed:phpMyAdmin-lang-5.1.1-1.2.aarch64", "openSUSE Tumbleweed:phpMyAdmin-lang-5.1.1-1.2.ppc64le", "openSUSE Tumbleweed:phpMyAdmin-lang-5.1.1-1.2.s390x", "openSUSE Tumbleweed:phpMyAdmin-lang-5.1.1-1.2.x86_64", ], }, references: [ { category: "external", summary: "CVE-2019-12922", url: "https://www.suse.com/security/cve/CVE-2019-12922", }, { category: "external", summary: "SUSE Bug 1150914 for CVE-2019-12922", url: "https://bugzilla.suse.com/1150914", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Tumbleweed:phpMyAdmin-5.1.1-1.2.aarch64", "openSUSE Tumbleweed:phpMyAdmin-5.1.1-1.2.ppc64le", "openSUSE Tumbleweed:phpMyAdmin-5.1.1-1.2.s390x", "openSUSE Tumbleweed:phpMyAdmin-5.1.1-1.2.x86_64", "openSUSE Tumbleweed:phpMyAdmin-apache-5.1.1-1.2.aarch64", "openSUSE Tumbleweed:phpMyAdmin-apache-5.1.1-1.2.ppc64le", "openSUSE Tumbleweed:phpMyAdmin-apache-5.1.1-1.2.s390x", "openSUSE Tumbleweed:phpMyAdmin-apache-5.1.1-1.2.x86_64", "openSUSE Tumbleweed:phpMyAdmin-lang-5.1.1-1.2.aarch64", "openSUSE Tumbleweed:phpMyAdmin-lang-5.1.1-1.2.ppc64le", "openSUSE Tumbleweed:phpMyAdmin-lang-5.1.1-1.2.s390x", "openSUSE Tumbleweed:phpMyAdmin-lang-5.1.1-1.2.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 6.5, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N", version: "3.1", }, products: [ "openSUSE Tumbleweed:phpMyAdmin-5.1.1-1.2.aarch64", "openSUSE Tumbleweed:phpMyAdmin-5.1.1-1.2.ppc64le", "openSUSE Tumbleweed:phpMyAdmin-5.1.1-1.2.s390x", "openSUSE Tumbleweed:phpMyAdmin-5.1.1-1.2.x86_64", "openSUSE Tumbleweed:phpMyAdmin-apache-5.1.1-1.2.aarch64", "openSUSE Tumbleweed:phpMyAdmin-apache-5.1.1-1.2.ppc64le", "openSUSE Tumbleweed:phpMyAdmin-apache-5.1.1-1.2.s390x", "openSUSE Tumbleweed:phpMyAdmin-apache-5.1.1-1.2.x86_64", "openSUSE Tumbleweed:phpMyAdmin-lang-5.1.1-1.2.aarch64", "openSUSE Tumbleweed:phpMyAdmin-lang-5.1.1-1.2.ppc64le", "openSUSE Tumbleweed:phpMyAdmin-lang-5.1.1-1.2.s390x", "openSUSE Tumbleweed:phpMyAdmin-lang-5.1.1-1.2.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-15T00:00:00Z", details: "moderate", }, ], title: "CVE-2019-12922", }, { cve: "CVE-2019-18622", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2019-18622", }, ], notes: [ { category: "general", text: "An issue was discovered in phpMyAdmin before 4.9.2. A crafted database/table name can be used to trigger a SQL injection attack through the designer feature.", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Tumbleweed:phpMyAdmin-5.1.1-1.2.aarch64", "openSUSE Tumbleweed:phpMyAdmin-5.1.1-1.2.ppc64le", "openSUSE Tumbleweed:phpMyAdmin-5.1.1-1.2.s390x", "openSUSE Tumbleweed:phpMyAdmin-5.1.1-1.2.x86_64", "openSUSE Tumbleweed:phpMyAdmin-apache-5.1.1-1.2.aarch64", "openSUSE Tumbleweed:phpMyAdmin-apache-5.1.1-1.2.ppc64le", "openSUSE Tumbleweed:phpMyAdmin-apache-5.1.1-1.2.s390x", "openSUSE Tumbleweed:phpMyAdmin-apache-5.1.1-1.2.x86_64", "openSUSE Tumbleweed:phpMyAdmin-lang-5.1.1-1.2.aarch64", "openSUSE Tumbleweed:phpMyAdmin-lang-5.1.1-1.2.ppc64le", "openSUSE Tumbleweed:phpMyAdmin-lang-5.1.1-1.2.s390x", "openSUSE Tumbleweed:phpMyAdmin-lang-5.1.1-1.2.x86_64", ], }, references: [ { category: "external", summary: "CVE-2019-18622", url: "https://www.suse.com/security/cve/CVE-2019-18622", }, { category: "external", summary: "SUSE Bug 1157614 for CVE-2019-18622", url: "https://bugzilla.suse.com/1157614", }, { category: "external", summary: "SUSE Bug 1158801 for CVE-2019-18622", url: "https://bugzilla.suse.com/1158801", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Tumbleweed:phpMyAdmin-5.1.1-1.2.aarch64", "openSUSE Tumbleweed:phpMyAdmin-5.1.1-1.2.ppc64le", "openSUSE Tumbleweed:phpMyAdmin-5.1.1-1.2.s390x", "openSUSE Tumbleweed:phpMyAdmin-5.1.1-1.2.x86_64", "openSUSE Tumbleweed:phpMyAdmin-apache-5.1.1-1.2.aarch64", "openSUSE Tumbleweed:phpMyAdmin-apache-5.1.1-1.2.ppc64le", "openSUSE Tumbleweed:phpMyAdmin-apache-5.1.1-1.2.s390x", "openSUSE Tumbleweed:phpMyAdmin-apache-5.1.1-1.2.x86_64", "openSUSE Tumbleweed:phpMyAdmin-lang-5.1.1-1.2.aarch64", "openSUSE Tumbleweed:phpMyAdmin-lang-5.1.1-1.2.ppc64le", "openSUSE Tumbleweed:phpMyAdmin-lang-5.1.1-1.2.s390x", "openSUSE Tumbleweed:phpMyAdmin-lang-5.1.1-1.2.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 9.8, baseSeverity: "CRITICAL", vectorString: "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", version: "3.1", }, products: [ "openSUSE Tumbleweed:phpMyAdmin-5.1.1-1.2.aarch64", "openSUSE Tumbleweed:phpMyAdmin-5.1.1-1.2.ppc64le", "openSUSE Tumbleweed:phpMyAdmin-5.1.1-1.2.s390x", "openSUSE Tumbleweed:phpMyAdmin-5.1.1-1.2.x86_64", "openSUSE Tumbleweed:phpMyAdmin-apache-5.1.1-1.2.aarch64", "openSUSE Tumbleweed:phpMyAdmin-apache-5.1.1-1.2.ppc64le", "openSUSE Tumbleweed:phpMyAdmin-apache-5.1.1-1.2.s390x", "openSUSE Tumbleweed:phpMyAdmin-apache-5.1.1-1.2.x86_64", "openSUSE Tumbleweed:phpMyAdmin-lang-5.1.1-1.2.aarch64", "openSUSE Tumbleweed:phpMyAdmin-lang-5.1.1-1.2.ppc64le", "openSUSE Tumbleweed:phpMyAdmin-lang-5.1.1-1.2.s390x", "openSUSE Tumbleweed:phpMyAdmin-lang-5.1.1-1.2.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-15T00:00:00Z", details: "important", }, ], title: "CVE-2019-18622", }, { cve: "CVE-2019-6798", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2019-6798", }, ], notes: [ { category: "general", text: "An issue was discovered in phpMyAdmin before 4.8.5. A vulnerability was reported where a specially crafted username can be used to trigger a SQL injection attack through the designer feature.", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Tumbleweed:phpMyAdmin-5.1.1-1.2.aarch64", "openSUSE Tumbleweed:phpMyAdmin-5.1.1-1.2.ppc64le", "openSUSE Tumbleweed:phpMyAdmin-5.1.1-1.2.s390x", "openSUSE Tumbleweed:phpMyAdmin-5.1.1-1.2.x86_64", "openSUSE Tumbleweed:phpMyAdmin-apache-5.1.1-1.2.aarch64", "openSUSE Tumbleweed:phpMyAdmin-apache-5.1.1-1.2.ppc64le", "openSUSE Tumbleweed:phpMyAdmin-apache-5.1.1-1.2.s390x", "openSUSE Tumbleweed:phpMyAdmin-apache-5.1.1-1.2.x86_64", "openSUSE Tumbleweed:phpMyAdmin-lang-5.1.1-1.2.aarch64", "openSUSE Tumbleweed:phpMyAdmin-lang-5.1.1-1.2.ppc64le", "openSUSE Tumbleweed:phpMyAdmin-lang-5.1.1-1.2.s390x", "openSUSE Tumbleweed:phpMyAdmin-lang-5.1.1-1.2.x86_64", ], }, references: [ { category: "external", summary: "CVE-2019-6798", url: "https://www.suse.com/security/cve/CVE-2019-6798", }, { category: "external", summary: "SUSE Bug 1123271 for CVE-2019-6798", url: "https://bugzilla.suse.com/1123271", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Tumbleweed:phpMyAdmin-5.1.1-1.2.aarch64", "openSUSE Tumbleweed:phpMyAdmin-5.1.1-1.2.ppc64le", "openSUSE Tumbleweed:phpMyAdmin-5.1.1-1.2.s390x", "openSUSE Tumbleweed:phpMyAdmin-5.1.1-1.2.x86_64", "openSUSE Tumbleweed:phpMyAdmin-apache-5.1.1-1.2.aarch64", "openSUSE Tumbleweed:phpMyAdmin-apache-5.1.1-1.2.ppc64le", "openSUSE Tumbleweed:phpMyAdmin-apache-5.1.1-1.2.s390x", "openSUSE Tumbleweed:phpMyAdmin-apache-5.1.1-1.2.x86_64", "openSUSE Tumbleweed:phpMyAdmin-lang-5.1.1-1.2.aarch64", "openSUSE Tumbleweed:phpMyAdmin-lang-5.1.1-1.2.ppc64le", "openSUSE Tumbleweed:phpMyAdmin-lang-5.1.1-1.2.s390x", "openSUSE Tumbleweed:phpMyAdmin-lang-5.1.1-1.2.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 9.8, baseSeverity: "CRITICAL", vectorString: "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", version: "3.0", }, products: [ "openSUSE Tumbleweed:phpMyAdmin-5.1.1-1.2.aarch64", "openSUSE Tumbleweed:phpMyAdmin-5.1.1-1.2.ppc64le", "openSUSE Tumbleweed:phpMyAdmin-5.1.1-1.2.s390x", "openSUSE Tumbleweed:phpMyAdmin-5.1.1-1.2.x86_64", "openSUSE Tumbleweed:phpMyAdmin-apache-5.1.1-1.2.aarch64", "openSUSE Tumbleweed:phpMyAdmin-apache-5.1.1-1.2.ppc64le", "openSUSE Tumbleweed:phpMyAdmin-apache-5.1.1-1.2.s390x", "openSUSE Tumbleweed:phpMyAdmin-apache-5.1.1-1.2.x86_64", "openSUSE Tumbleweed:phpMyAdmin-lang-5.1.1-1.2.aarch64", "openSUSE Tumbleweed:phpMyAdmin-lang-5.1.1-1.2.ppc64le", "openSUSE Tumbleweed:phpMyAdmin-lang-5.1.1-1.2.s390x", "openSUSE Tumbleweed:phpMyAdmin-lang-5.1.1-1.2.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-15T00:00:00Z", details: "moderate", }, ], title: "CVE-2019-6798", }, { cve: "CVE-2019-6799", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2019-6799", }, ], notes: [ { category: "general", text: "An issue was discovered in phpMyAdmin before 4.8.5. When the AllowArbitraryServer configuration setting is set to true, with the use of a rogue MySQL server, an attacker can read any file on the server that the web server's user can access. This is related to the mysql.allow_local_infile PHP configuration, and the inadvertent ignoring of \"options(MYSQLI_OPT_LOCAL_INFILE\" calls.", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Tumbleweed:phpMyAdmin-5.1.1-1.2.aarch64", "openSUSE Tumbleweed:phpMyAdmin-5.1.1-1.2.ppc64le", "openSUSE Tumbleweed:phpMyAdmin-5.1.1-1.2.s390x", "openSUSE Tumbleweed:phpMyAdmin-5.1.1-1.2.x86_64", "openSUSE Tumbleweed:phpMyAdmin-apache-5.1.1-1.2.aarch64", "openSUSE Tumbleweed:phpMyAdmin-apache-5.1.1-1.2.ppc64le", "openSUSE Tumbleweed:phpMyAdmin-apache-5.1.1-1.2.s390x", "openSUSE Tumbleweed:phpMyAdmin-apache-5.1.1-1.2.x86_64", "openSUSE Tumbleweed:phpMyAdmin-lang-5.1.1-1.2.aarch64", "openSUSE Tumbleweed:phpMyAdmin-lang-5.1.1-1.2.ppc64le", "openSUSE Tumbleweed:phpMyAdmin-lang-5.1.1-1.2.s390x", "openSUSE Tumbleweed:phpMyAdmin-lang-5.1.1-1.2.x86_64", ], }, references: [ { category: "external", summary: "CVE-2019-6799", url: "https://www.suse.com/security/cve/CVE-2019-6799", }, { category: "external", summary: "SUSE Bug 1123272 for CVE-2019-6799", url: "https://bugzilla.suse.com/1123272", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Tumbleweed:phpMyAdmin-5.1.1-1.2.aarch64", "openSUSE Tumbleweed:phpMyAdmin-5.1.1-1.2.ppc64le", "openSUSE Tumbleweed:phpMyAdmin-5.1.1-1.2.s390x", "openSUSE Tumbleweed:phpMyAdmin-5.1.1-1.2.x86_64", "openSUSE Tumbleweed:phpMyAdmin-apache-5.1.1-1.2.aarch64", "openSUSE Tumbleweed:phpMyAdmin-apache-5.1.1-1.2.ppc64le", "openSUSE Tumbleweed:phpMyAdmin-apache-5.1.1-1.2.s390x", "openSUSE Tumbleweed:phpMyAdmin-apache-5.1.1-1.2.x86_64", "openSUSE Tumbleweed:phpMyAdmin-lang-5.1.1-1.2.aarch64", "openSUSE Tumbleweed:phpMyAdmin-lang-5.1.1-1.2.ppc64le", "openSUSE Tumbleweed:phpMyAdmin-lang-5.1.1-1.2.s390x", "openSUSE Tumbleweed:phpMyAdmin-lang-5.1.1-1.2.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 5.9, baseSeverity: "MEDIUM", vectorString: "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N", version: "3.0", }, products: [ "openSUSE Tumbleweed:phpMyAdmin-5.1.1-1.2.aarch64", "openSUSE Tumbleweed:phpMyAdmin-5.1.1-1.2.ppc64le", "openSUSE Tumbleweed:phpMyAdmin-5.1.1-1.2.s390x", "openSUSE Tumbleweed:phpMyAdmin-5.1.1-1.2.x86_64", "openSUSE Tumbleweed:phpMyAdmin-apache-5.1.1-1.2.aarch64", "openSUSE Tumbleweed:phpMyAdmin-apache-5.1.1-1.2.ppc64le", "openSUSE Tumbleweed:phpMyAdmin-apache-5.1.1-1.2.s390x", "openSUSE Tumbleweed:phpMyAdmin-apache-5.1.1-1.2.x86_64", "openSUSE Tumbleweed:phpMyAdmin-lang-5.1.1-1.2.aarch64", "openSUSE Tumbleweed:phpMyAdmin-lang-5.1.1-1.2.ppc64le", "openSUSE Tumbleweed:phpMyAdmin-lang-5.1.1-1.2.s390x", "openSUSE Tumbleweed:phpMyAdmin-lang-5.1.1-1.2.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-15T00:00:00Z", details: "moderate", }, ], title: "CVE-2019-6799", }, { cve: "CVE-2020-10802", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2020-10802", }, ], notes: [ { category: "general", text: "In phpMyAdmin 4.x before 4.9.5 and 5.x before 5.0.2, a SQL injection vulnerability has been discovered where certain parameters are not properly escaped when generating certain queries for search actions in libraries/classes/Controllers/Table/TableSearchController.php. An attacker can generate a crafted database or table name. The attack can be performed if a user attempts certain search operations on the malicious database or table.", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Tumbleweed:phpMyAdmin-5.1.1-1.2.aarch64", "openSUSE Tumbleweed:phpMyAdmin-5.1.1-1.2.ppc64le", "openSUSE Tumbleweed:phpMyAdmin-5.1.1-1.2.s390x", "openSUSE Tumbleweed:phpMyAdmin-5.1.1-1.2.x86_64", "openSUSE Tumbleweed:phpMyAdmin-apache-5.1.1-1.2.aarch64", "openSUSE Tumbleweed:phpMyAdmin-apache-5.1.1-1.2.ppc64le", "openSUSE Tumbleweed:phpMyAdmin-apache-5.1.1-1.2.s390x", "openSUSE Tumbleweed:phpMyAdmin-apache-5.1.1-1.2.x86_64", "openSUSE Tumbleweed:phpMyAdmin-lang-5.1.1-1.2.aarch64", "openSUSE Tumbleweed:phpMyAdmin-lang-5.1.1-1.2.ppc64le", "openSUSE Tumbleweed:phpMyAdmin-lang-5.1.1-1.2.s390x", "openSUSE Tumbleweed:phpMyAdmin-lang-5.1.1-1.2.x86_64", ], }, references: [ { category: "external", summary: "CVE-2020-10802", url: "https://www.suse.com/security/cve/CVE-2020-10802", }, { category: "external", summary: "SUSE Bug 1167336 for CVE-2020-10802", url: "https://bugzilla.suse.com/1167336", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Tumbleweed:phpMyAdmin-5.1.1-1.2.aarch64", "openSUSE Tumbleweed:phpMyAdmin-5.1.1-1.2.ppc64le", "openSUSE Tumbleweed:phpMyAdmin-5.1.1-1.2.s390x", "openSUSE Tumbleweed:phpMyAdmin-5.1.1-1.2.x86_64", "openSUSE Tumbleweed:phpMyAdmin-apache-5.1.1-1.2.aarch64", "openSUSE Tumbleweed:phpMyAdmin-apache-5.1.1-1.2.ppc64le", "openSUSE Tumbleweed:phpMyAdmin-apache-5.1.1-1.2.s390x", "openSUSE Tumbleweed:phpMyAdmin-apache-5.1.1-1.2.x86_64", "openSUSE Tumbleweed:phpMyAdmin-lang-5.1.1-1.2.aarch64", "openSUSE Tumbleweed:phpMyAdmin-lang-5.1.1-1.2.ppc64le", "openSUSE Tumbleweed:phpMyAdmin-lang-5.1.1-1.2.s390x", "openSUSE Tumbleweed:phpMyAdmin-lang-5.1.1-1.2.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 8, baseSeverity: "HIGH", vectorString: "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H", version: "3.1", }, products: [ "openSUSE Tumbleweed:phpMyAdmin-5.1.1-1.2.aarch64", "openSUSE Tumbleweed:phpMyAdmin-5.1.1-1.2.ppc64le", "openSUSE Tumbleweed:phpMyAdmin-5.1.1-1.2.s390x", "openSUSE Tumbleweed:phpMyAdmin-5.1.1-1.2.x86_64", "openSUSE Tumbleweed:phpMyAdmin-apache-5.1.1-1.2.aarch64", "openSUSE Tumbleweed:phpMyAdmin-apache-5.1.1-1.2.ppc64le", "openSUSE Tumbleweed:phpMyAdmin-apache-5.1.1-1.2.s390x", "openSUSE Tumbleweed:phpMyAdmin-apache-5.1.1-1.2.x86_64", "openSUSE Tumbleweed:phpMyAdmin-lang-5.1.1-1.2.aarch64", "openSUSE Tumbleweed:phpMyAdmin-lang-5.1.1-1.2.ppc64le", "openSUSE Tumbleweed:phpMyAdmin-lang-5.1.1-1.2.s390x", "openSUSE Tumbleweed:phpMyAdmin-lang-5.1.1-1.2.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-15T00:00:00Z", details: "important", }, ], title: "CVE-2020-10802", }, { cve: "CVE-2020-10803", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2020-10803", }, ], notes: [ { category: "general", text: "In phpMyAdmin 4.x before 4.9.5 and 5.x before 5.0.2, a SQL injection vulnerability was discovered where malicious code could be used to trigger an XSS attack through retrieving and displaying results (in tbl_get_field.php and libraries/classes/Display/Results.php). The attacker must be able to insert crafted data into certain database tables, which when retrieved (for instance, through the Browse tab) can trigger the XSS attack.", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Tumbleweed:phpMyAdmin-5.1.1-1.2.aarch64", "openSUSE Tumbleweed:phpMyAdmin-5.1.1-1.2.ppc64le", "openSUSE Tumbleweed:phpMyAdmin-5.1.1-1.2.s390x", "openSUSE Tumbleweed:phpMyAdmin-5.1.1-1.2.x86_64", "openSUSE Tumbleweed:phpMyAdmin-apache-5.1.1-1.2.aarch64", "openSUSE Tumbleweed:phpMyAdmin-apache-5.1.1-1.2.ppc64le", "openSUSE Tumbleweed:phpMyAdmin-apache-5.1.1-1.2.s390x", "openSUSE Tumbleweed:phpMyAdmin-apache-5.1.1-1.2.x86_64", "openSUSE Tumbleweed:phpMyAdmin-lang-5.1.1-1.2.aarch64", "openSUSE Tumbleweed:phpMyAdmin-lang-5.1.1-1.2.ppc64le", "openSUSE Tumbleweed:phpMyAdmin-lang-5.1.1-1.2.s390x", "openSUSE Tumbleweed:phpMyAdmin-lang-5.1.1-1.2.x86_64", ], }, references: [ { category: "external", summary: "CVE-2020-10803", url: "https://www.suse.com/security/cve/CVE-2020-10803", }, { category: "external", summary: "SUSE Bug 1167337 for CVE-2020-10803", url: "https://bugzilla.suse.com/1167337", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Tumbleweed:phpMyAdmin-5.1.1-1.2.aarch64", "openSUSE Tumbleweed:phpMyAdmin-5.1.1-1.2.ppc64le", "openSUSE Tumbleweed:phpMyAdmin-5.1.1-1.2.s390x", "openSUSE Tumbleweed:phpMyAdmin-5.1.1-1.2.x86_64", "openSUSE Tumbleweed:phpMyAdmin-apache-5.1.1-1.2.aarch64", "openSUSE Tumbleweed:phpMyAdmin-apache-5.1.1-1.2.ppc64le", "openSUSE Tumbleweed:phpMyAdmin-apache-5.1.1-1.2.s390x", "openSUSE Tumbleweed:phpMyAdmin-apache-5.1.1-1.2.x86_64", "openSUSE Tumbleweed:phpMyAdmin-lang-5.1.1-1.2.aarch64", "openSUSE Tumbleweed:phpMyAdmin-lang-5.1.1-1.2.ppc64le", "openSUSE Tumbleweed:phpMyAdmin-lang-5.1.1-1.2.s390x", "openSUSE Tumbleweed:phpMyAdmin-lang-5.1.1-1.2.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 5.4, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N", version: "3.1", }, products: [ "openSUSE Tumbleweed:phpMyAdmin-5.1.1-1.2.aarch64", "openSUSE Tumbleweed:phpMyAdmin-5.1.1-1.2.ppc64le", "openSUSE Tumbleweed:phpMyAdmin-5.1.1-1.2.s390x", "openSUSE Tumbleweed:phpMyAdmin-5.1.1-1.2.x86_64", "openSUSE Tumbleweed:phpMyAdmin-apache-5.1.1-1.2.aarch64", "openSUSE Tumbleweed:phpMyAdmin-apache-5.1.1-1.2.ppc64le", "openSUSE Tumbleweed:phpMyAdmin-apache-5.1.1-1.2.s390x", "openSUSE Tumbleweed:phpMyAdmin-apache-5.1.1-1.2.x86_64", "openSUSE Tumbleweed:phpMyAdmin-lang-5.1.1-1.2.aarch64", "openSUSE Tumbleweed:phpMyAdmin-lang-5.1.1-1.2.ppc64le", "openSUSE Tumbleweed:phpMyAdmin-lang-5.1.1-1.2.s390x", "openSUSE Tumbleweed:phpMyAdmin-lang-5.1.1-1.2.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-15T00:00:00Z", details: "moderate", }, ], title: "CVE-2020-10803", }, { cve: "CVE-2020-10804", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2020-10804", }, ], notes: [ { category: "general", text: "In phpMyAdmin 4.x before 4.9.5 and 5.x before 5.0.2, a SQL injection vulnerability was found in retrieval of the current username (in libraries/classes/Server/Privileges.php and libraries/classes/UserPassword.php). A malicious user with access to the server could create a crafted username, and then trick the victim into performing specific actions with that user account (such as editing its privileges).", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Tumbleweed:phpMyAdmin-5.1.1-1.2.aarch64", "openSUSE Tumbleweed:phpMyAdmin-5.1.1-1.2.ppc64le", "openSUSE Tumbleweed:phpMyAdmin-5.1.1-1.2.s390x", "openSUSE Tumbleweed:phpMyAdmin-5.1.1-1.2.x86_64", "openSUSE Tumbleweed:phpMyAdmin-apache-5.1.1-1.2.aarch64", "openSUSE Tumbleweed:phpMyAdmin-apache-5.1.1-1.2.ppc64le", "openSUSE Tumbleweed:phpMyAdmin-apache-5.1.1-1.2.s390x", "openSUSE Tumbleweed:phpMyAdmin-apache-5.1.1-1.2.x86_64", "openSUSE Tumbleweed:phpMyAdmin-lang-5.1.1-1.2.aarch64", "openSUSE Tumbleweed:phpMyAdmin-lang-5.1.1-1.2.ppc64le", "openSUSE Tumbleweed:phpMyAdmin-lang-5.1.1-1.2.s390x", "openSUSE Tumbleweed:phpMyAdmin-lang-5.1.1-1.2.x86_64", ], }, references: [ { category: "external", summary: "CVE-2020-10804", url: "https://www.suse.com/security/cve/CVE-2020-10804", }, { category: "external", summary: "SUSE Bug 1167335 for CVE-2020-10804", url: "https://bugzilla.suse.com/1167335", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Tumbleweed:phpMyAdmin-5.1.1-1.2.aarch64", "openSUSE Tumbleweed:phpMyAdmin-5.1.1-1.2.ppc64le", "openSUSE Tumbleweed:phpMyAdmin-5.1.1-1.2.s390x", "openSUSE Tumbleweed:phpMyAdmin-5.1.1-1.2.x86_64", "openSUSE Tumbleweed:phpMyAdmin-apache-5.1.1-1.2.aarch64", "openSUSE Tumbleweed:phpMyAdmin-apache-5.1.1-1.2.ppc64le", "openSUSE Tumbleweed:phpMyAdmin-apache-5.1.1-1.2.s390x", "openSUSE Tumbleweed:phpMyAdmin-apache-5.1.1-1.2.x86_64", "openSUSE Tumbleweed:phpMyAdmin-lang-5.1.1-1.2.aarch64", "openSUSE Tumbleweed:phpMyAdmin-lang-5.1.1-1.2.ppc64le", "openSUSE Tumbleweed:phpMyAdmin-lang-5.1.1-1.2.s390x", "openSUSE Tumbleweed:phpMyAdmin-lang-5.1.1-1.2.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 8, baseSeverity: "HIGH", vectorString: "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H", version: "3.1", }, products: [ "openSUSE Tumbleweed:phpMyAdmin-5.1.1-1.2.aarch64", "openSUSE Tumbleweed:phpMyAdmin-5.1.1-1.2.ppc64le", "openSUSE Tumbleweed:phpMyAdmin-5.1.1-1.2.s390x", "openSUSE Tumbleweed:phpMyAdmin-5.1.1-1.2.x86_64", "openSUSE Tumbleweed:phpMyAdmin-apache-5.1.1-1.2.aarch64", "openSUSE Tumbleweed:phpMyAdmin-apache-5.1.1-1.2.ppc64le", "openSUSE Tumbleweed:phpMyAdmin-apache-5.1.1-1.2.s390x", "openSUSE Tumbleweed:phpMyAdmin-apache-5.1.1-1.2.x86_64", "openSUSE Tumbleweed:phpMyAdmin-lang-5.1.1-1.2.aarch64", "openSUSE Tumbleweed:phpMyAdmin-lang-5.1.1-1.2.ppc64le", "openSUSE Tumbleweed:phpMyAdmin-lang-5.1.1-1.2.s390x", "openSUSE Tumbleweed:phpMyAdmin-lang-5.1.1-1.2.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-15T00:00:00Z", details: "important", }, ], title: "CVE-2020-10804", }, { cve: "CVE-2020-26934", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2020-26934", }, ], notes: [ { category: "general", text: "phpMyAdmin before 4.9.6 and 5.x before 5.0.3 allows XSS through the transformation feature via a crafted link.", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Tumbleweed:phpMyAdmin-5.1.1-1.2.aarch64", "openSUSE Tumbleweed:phpMyAdmin-5.1.1-1.2.ppc64le", "openSUSE Tumbleweed:phpMyAdmin-5.1.1-1.2.s390x", "openSUSE Tumbleweed:phpMyAdmin-5.1.1-1.2.x86_64", "openSUSE Tumbleweed:phpMyAdmin-apache-5.1.1-1.2.aarch64", "openSUSE Tumbleweed:phpMyAdmin-apache-5.1.1-1.2.ppc64le", "openSUSE Tumbleweed:phpMyAdmin-apache-5.1.1-1.2.s390x", "openSUSE Tumbleweed:phpMyAdmin-apache-5.1.1-1.2.x86_64", "openSUSE Tumbleweed:phpMyAdmin-lang-5.1.1-1.2.aarch64", "openSUSE Tumbleweed:phpMyAdmin-lang-5.1.1-1.2.ppc64le", "openSUSE Tumbleweed:phpMyAdmin-lang-5.1.1-1.2.s390x", "openSUSE Tumbleweed:phpMyAdmin-lang-5.1.1-1.2.x86_64", ], }, references: [ { category: "external", summary: "CVE-2020-26934", url: "https://www.suse.com/security/cve/CVE-2020-26934", }, { category: "external", summary: "SUSE Bug 1177561 for CVE-2020-26934", url: "https://bugzilla.suse.com/1177561", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Tumbleweed:phpMyAdmin-5.1.1-1.2.aarch64", "openSUSE Tumbleweed:phpMyAdmin-5.1.1-1.2.ppc64le", "openSUSE Tumbleweed:phpMyAdmin-5.1.1-1.2.s390x", "openSUSE Tumbleweed:phpMyAdmin-5.1.1-1.2.x86_64", "openSUSE Tumbleweed:phpMyAdmin-apache-5.1.1-1.2.aarch64", "openSUSE Tumbleweed:phpMyAdmin-apache-5.1.1-1.2.ppc64le", "openSUSE Tumbleweed:phpMyAdmin-apache-5.1.1-1.2.s390x", "openSUSE Tumbleweed:phpMyAdmin-apache-5.1.1-1.2.x86_64", "openSUSE Tumbleweed:phpMyAdmin-lang-5.1.1-1.2.aarch64", "openSUSE Tumbleweed:phpMyAdmin-lang-5.1.1-1.2.ppc64le", "openSUSE Tumbleweed:phpMyAdmin-lang-5.1.1-1.2.s390x", "openSUSE Tumbleweed:phpMyAdmin-lang-5.1.1-1.2.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 6.1, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N", version: "3.1", }, products: [ "openSUSE Tumbleweed:phpMyAdmin-5.1.1-1.2.aarch64", "openSUSE Tumbleweed:phpMyAdmin-5.1.1-1.2.ppc64le", "openSUSE Tumbleweed:phpMyAdmin-5.1.1-1.2.s390x", "openSUSE Tumbleweed:phpMyAdmin-5.1.1-1.2.x86_64", "openSUSE Tumbleweed:phpMyAdmin-apache-5.1.1-1.2.aarch64", "openSUSE Tumbleweed:phpMyAdmin-apache-5.1.1-1.2.ppc64le", "openSUSE Tumbleweed:phpMyAdmin-apache-5.1.1-1.2.s390x", "openSUSE Tumbleweed:phpMyAdmin-apache-5.1.1-1.2.x86_64", "openSUSE Tumbleweed:phpMyAdmin-lang-5.1.1-1.2.aarch64", "openSUSE Tumbleweed:phpMyAdmin-lang-5.1.1-1.2.ppc64le", "openSUSE Tumbleweed:phpMyAdmin-lang-5.1.1-1.2.s390x", "openSUSE Tumbleweed:phpMyAdmin-lang-5.1.1-1.2.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-15T00:00:00Z", details: "moderate", }, ], title: "CVE-2020-26934", }, { cve: "CVE-2020-26935", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2020-26935", }, ], notes: [ { category: "general", text: "An issue was discovered in SearchController in phpMyAdmin before 4.9.6 and 5.x before 5.0.3. A SQL injection vulnerability was discovered in how phpMyAdmin processes SQL statements in the search feature. An attacker could use this flaw to inject malicious SQL in to a query.", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Tumbleweed:phpMyAdmin-5.1.1-1.2.aarch64", "openSUSE Tumbleweed:phpMyAdmin-5.1.1-1.2.ppc64le", "openSUSE Tumbleweed:phpMyAdmin-5.1.1-1.2.s390x", "openSUSE Tumbleweed:phpMyAdmin-5.1.1-1.2.x86_64", "openSUSE Tumbleweed:phpMyAdmin-apache-5.1.1-1.2.aarch64", "openSUSE Tumbleweed:phpMyAdmin-apache-5.1.1-1.2.ppc64le", "openSUSE Tumbleweed:phpMyAdmin-apache-5.1.1-1.2.s390x", "openSUSE Tumbleweed:phpMyAdmin-apache-5.1.1-1.2.x86_64", "openSUSE Tumbleweed:phpMyAdmin-lang-5.1.1-1.2.aarch64", "openSUSE Tumbleweed:phpMyAdmin-lang-5.1.1-1.2.ppc64le", "openSUSE Tumbleweed:phpMyAdmin-lang-5.1.1-1.2.s390x", "openSUSE Tumbleweed:phpMyAdmin-lang-5.1.1-1.2.x86_64", ], }, references: [ { category: "external", summary: "CVE-2020-26935", url: "https://www.suse.com/security/cve/CVE-2020-26935", }, { category: "external", summary: "SUSE Bug 1177562 for CVE-2020-26935", url: "https://bugzilla.suse.com/1177562", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Tumbleweed:phpMyAdmin-5.1.1-1.2.aarch64", "openSUSE Tumbleweed:phpMyAdmin-5.1.1-1.2.ppc64le", "openSUSE Tumbleweed:phpMyAdmin-5.1.1-1.2.s390x", "openSUSE Tumbleweed:phpMyAdmin-5.1.1-1.2.x86_64", "openSUSE Tumbleweed:phpMyAdmin-apache-5.1.1-1.2.aarch64", "openSUSE Tumbleweed:phpMyAdmin-apache-5.1.1-1.2.ppc64le", "openSUSE Tumbleweed:phpMyAdmin-apache-5.1.1-1.2.s390x", "openSUSE Tumbleweed:phpMyAdmin-apache-5.1.1-1.2.x86_64", "openSUSE Tumbleweed:phpMyAdmin-lang-5.1.1-1.2.aarch64", "openSUSE Tumbleweed:phpMyAdmin-lang-5.1.1-1.2.ppc64le", "openSUSE Tumbleweed:phpMyAdmin-lang-5.1.1-1.2.s390x", "openSUSE Tumbleweed:phpMyAdmin-lang-5.1.1-1.2.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 9.8, baseSeverity: "CRITICAL", vectorString: "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", version: "3.1", }, products: [ "openSUSE Tumbleweed:phpMyAdmin-5.1.1-1.2.aarch64", "openSUSE Tumbleweed:phpMyAdmin-5.1.1-1.2.ppc64le", "openSUSE Tumbleweed:phpMyAdmin-5.1.1-1.2.s390x", "openSUSE Tumbleweed:phpMyAdmin-5.1.1-1.2.x86_64", "openSUSE Tumbleweed:phpMyAdmin-apache-5.1.1-1.2.aarch64", "openSUSE Tumbleweed:phpMyAdmin-apache-5.1.1-1.2.ppc64le", "openSUSE Tumbleweed:phpMyAdmin-apache-5.1.1-1.2.s390x", "openSUSE Tumbleweed:phpMyAdmin-apache-5.1.1-1.2.x86_64", "openSUSE Tumbleweed:phpMyAdmin-lang-5.1.1-1.2.aarch64", "openSUSE Tumbleweed:phpMyAdmin-lang-5.1.1-1.2.ppc64le", "openSUSE Tumbleweed:phpMyAdmin-lang-5.1.1-1.2.s390x", "openSUSE Tumbleweed:phpMyAdmin-lang-5.1.1-1.2.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-15T00:00:00Z", details: "critical", }, ], title: "CVE-2020-26935", }, { cve: "CVE-2020-5504", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2020-5504", }, ], notes: [ { category: "general", text: "In phpMyAdmin 4 before 4.9.4 and 5 before 5.0.1, SQL injection exists in the user accounts page. A malicious user could inject custom SQL in place of their own username when creating queries to this page. An attacker must have a valid MySQL account to access the server.", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Tumbleweed:phpMyAdmin-5.1.1-1.2.aarch64", "openSUSE Tumbleweed:phpMyAdmin-5.1.1-1.2.ppc64le", "openSUSE Tumbleweed:phpMyAdmin-5.1.1-1.2.s390x", "openSUSE Tumbleweed:phpMyAdmin-5.1.1-1.2.x86_64", "openSUSE Tumbleweed:phpMyAdmin-apache-5.1.1-1.2.aarch64", "openSUSE Tumbleweed:phpMyAdmin-apache-5.1.1-1.2.ppc64le", "openSUSE Tumbleweed:phpMyAdmin-apache-5.1.1-1.2.s390x", "openSUSE Tumbleweed:phpMyAdmin-apache-5.1.1-1.2.x86_64", "openSUSE Tumbleweed:phpMyAdmin-lang-5.1.1-1.2.aarch64", "openSUSE Tumbleweed:phpMyAdmin-lang-5.1.1-1.2.ppc64le", "openSUSE Tumbleweed:phpMyAdmin-lang-5.1.1-1.2.s390x", "openSUSE Tumbleweed:phpMyAdmin-lang-5.1.1-1.2.x86_64", ], }, references: [ { category: "external", summary: "CVE-2020-5504", url: "https://www.suse.com/security/cve/CVE-2020-5504", }, { category: "external", summary: "SUSE Bug 1160456 for CVE-2020-5504", url: "https://bugzilla.suse.com/1160456", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Tumbleweed:phpMyAdmin-5.1.1-1.2.aarch64", "openSUSE Tumbleweed:phpMyAdmin-5.1.1-1.2.ppc64le", "openSUSE Tumbleweed:phpMyAdmin-5.1.1-1.2.s390x", "openSUSE Tumbleweed:phpMyAdmin-5.1.1-1.2.x86_64", "openSUSE Tumbleweed:phpMyAdmin-apache-5.1.1-1.2.aarch64", "openSUSE Tumbleweed:phpMyAdmin-apache-5.1.1-1.2.ppc64le", "openSUSE Tumbleweed:phpMyAdmin-apache-5.1.1-1.2.s390x", "openSUSE Tumbleweed:phpMyAdmin-apache-5.1.1-1.2.x86_64", "openSUSE Tumbleweed:phpMyAdmin-lang-5.1.1-1.2.aarch64", "openSUSE Tumbleweed:phpMyAdmin-lang-5.1.1-1.2.ppc64le", "openSUSE Tumbleweed:phpMyAdmin-lang-5.1.1-1.2.s390x", "openSUSE Tumbleweed:phpMyAdmin-lang-5.1.1-1.2.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 8.8, baseSeverity: "HIGH", vectorString: "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", version: "3.1", }, products: [ "openSUSE Tumbleweed:phpMyAdmin-5.1.1-1.2.aarch64", "openSUSE Tumbleweed:phpMyAdmin-5.1.1-1.2.ppc64le", "openSUSE Tumbleweed:phpMyAdmin-5.1.1-1.2.s390x", "openSUSE Tumbleweed:phpMyAdmin-5.1.1-1.2.x86_64", "openSUSE Tumbleweed:phpMyAdmin-apache-5.1.1-1.2.aarch64", "openSUSE Tumbleweed:phpMyAdmin-apache-5.1.1-1.2.ppc64le", "openSUSE Tumbleweed:phpMyAdmin-apache-5.1.1-1.2.s390x", "openSUSE Tumbleweed:phpMyAdmin-apache-5.1.1-1.2.x86_64", "openSUSE Tumbleweed:phpMyAdmin-lang-5.1.1-1.2.aarch64", "openSUSE Tumbleweed:phpMyAdmin-lang-5.1.1-1.2.ppc64le", "openSUSE Tumbleweed:phpMyAdmin-lang-5.1.1-1.2.s390x", "openSUSE Tumbleweed:phpMyAdmin-lang-5.1.1-1.2.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-15T00:00:00Z", details: "moderate", }, ], title: "CVE-2020-5504", }, ], }
fkie_cve-2018-12613
Vulnerability from fkie_nvd
Vendor | Product | Version | |
---|---|---|---|
phpmyadmin | phpmyadmin | * |
{ configurations: [ { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:a:phpmyadmin:phpmyadmin:*:*:*:*:*:*:*:*", matchCriteriaId: "04FBC08B-0D3A-44E3-8C3D-82F6723EA7D9", versionEndExcluding: "4.8.2", versionStartIncluding: "4.8.0", vulnerable: true, }, ], negate: false, operator: "OR", }, ], }, ], cveTags: [], descriptions: [ { lang: "en", value: "An issue was discovered in phpMyAdmin 4.8.x before 4.8.2, in which an attacker can include (view and potentially execute) files on the server. The vulnerability comes from a portion of code where pages are redirected and loaded within phpMyAdmin, and an improper test for whitelisted pages. An attacker must be authenticated, except in the \"$cfg['AllowArbitraryServer'] = true\" case (where an attacker can specify any host he/she is already in control of, and execute arbitrary code on phpMyAdmin) and the \"$cfg['ServerDefault'] = 0\" case (which bypasses the login requirement and runs the vulnerable code without any authentication).", }, { lang: "es", value: "Se ha descubierto un problema en phpMyAdmin en versiones 4.38.3x anteriores a la 4.8.2 por el cual un atacante puede incluir (ver y, potencialmente, ejecutar) archivos en el servidor. La vulnerabilidad procede de una porción de código en el que las páginas se redirigen y cargan en phpMyAdmin y se realiza una prueba inadecuada para páginas en la lista blanca. Un atacante debe estar autenticado, excepto en el caso en el que \"$cfg['AllowArbitraryServer'] = true\" (en el que un atacante puede especificar cualquier host que ya controle y ejecutar código arbitrario en phpMyAdmin) y en el caso \"$cfg['ServerDefault'] = 0\" (que omite el requisito de inicio de sesión y ejecuta el código vulnerable sin autenticación).", }, ], id: "CVE-2018-12613", lastModified: "2024-11-21T03:45:32.740", metrics: { cvssMetricV2: [ { acInsufInfo: false, baseSeverity: "MEDIUM", cvssData: { accessComplexity: "LOW", accessVector: "NETWORK", authentication: "SINGLE", availabilityImpact: "PARTIAL", baseScore: 6.5, confidentialityImpact: "PARTIAL", integrityImpact: "PARTIAL", vectorString: "AV:N/AC:L/Au:S/C:P/I:P/A:P", version: "2.0", }, exploitabilityScore: 8, impactScore: 6.4, obtainAllPrivilege: false, obtainOtherPrivilege: false, obtainUserPrivilege: false, source: "nvd@nist.gov", type: "Primary", userInteractionRequired: false, }, ], cvssMetricV31: [ { cvssData: { attackComplexity: "LOW", attackVector: "NETWORK", availabilityImpact: "HIGH", baseScore: 8.8, baseSeverity: "HIGH", confidentialityImpact: "HIGH", integrityImpact: "HIGH", privilegesRequired: "LOW", scope: "UNCHANGED", userInteraction: "NONE", vectorString: "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", version: "3.1", }, exploitabilityScore: 2.8, impactScore: 5.9, source: "nvd@nist.gov", type: "Primary", }, ], }, published: "2018-06-21T20:29:00.327", references: [ { source: "cve@mitre.org", tags: [ "Exploit", "Third Party Advisory", "VDB Entry", ], url: "http://packetstormsecurity.com/files/164623/phpMyAdmin-4.8.1-Remote-Code-Execution.html", }, { source: "cve@mitre.org", tags: [ "Third Party Advisory", "VDB Entry", ], url: "http://www.securityfocus.com/bid/104532", }, { source: "cve@mitre.org", tags: [ "Third Party Advisory", ], url: "https://security.gentoo.org/glsa/201904-16", }, { source: "cve@mitre.org", tags: [ "Exploit", "Third Party Advisory", "VDB Entry", ], url: "https://www.exploit-db.com/exploits/44924/", }, { source: "cve@mitre.org", tags: [ "Third Party Advisory", "VDB Entry", ], url: "https://www.exploit-db.com/exploits/44928/", }, { source: "cve@mitre.org", tags: [ "Exploit", "Third Party Advisory", "VDB Entry", ], url: "https://www.exploit-db.com/exploits/45020/", }, { source: "cve@mitre.org", tags: [ "Vendor Advisory", ], url: "https://www.phpmyadmin.net/security/PMASA-2018-4/", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Exploit", "Third Party Advisory", "VDB Entry", ], url: "http://packetstormsecurity.com/files/164623/phpMyAdmin-4.8.1-Remote-Code-Execution.html", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Third Party Advisory", "VDB Entry", ], url: "http://www.securityfocus.com/bid/104532", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Third Party Advisory", ], url: "https://security.gentoo.org/glsa/201904-16", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Exploit", "Third Party Advisory", "VDB Entry", ], url: "https://www.exploit-db.com/exploits/44924/", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Third Party Advisory", "VDB Entry", ], url: "https://www.exploit-db.com/exploits/44928/", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Exploit", "Third Party Advisory", "VDB Entry", ], url: "https://www.exploit-db.com/exploits/45020/", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Vendor Advisory", ], url: "https://www.phpmyadmin.net/security/PMASA-2018-4/", }, ], sourceIdentifier: "cve@mitre.org", vulnStatus: "Modified", weaknesses: [ { description: [ { lang: "en", value: "CWE-287", }, ], source: "nvd@nist.gov", type: "Primary", }, ], }
Log in or create an account to share your comment.
This schema specifies the format of a comment related to a security advisory.
Sightings
Author | Source | Type | Date |
---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
- Confirmed: The vulnerability is confirmed from an analyst perspective.
- Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
- Patched: This vulnerability was successfully patched by the user reporting the sighting.
- Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
- Not confirmed: The user expresses doubt about the veracity of the vulnerability.
- Not patched: This vulnerability was not successfully patched by the user reporting the sighting.