An attacker can exploit phpMyAdmin before 4.8.4 to leak the contents of a local file because of an error in the transformation feature. The attacker must have access to the phpMyAdmin Configuration Storage tables, although these can easily be created in any database to which the attacker has access. An attacker must have valid credentials to log in to phpMyAdmin; this vulnerability does not allow an attacker to circumvent the login system.
References
Link | Resource |
---|---|
http://www.securityfocus.com/bid/106178 | Third Party Advisory VDB Entry |
https://lists.debian.org/debian-lts-announce/2019/02/msg00003.html | Mailing List Third Party Advisory |
https://security.gentoo.org/glsa/201904-16 | Third Party Advisory |
https://www.phpmyadmin.net/security/PMASA-2018-6/ | Patch Vendor Advisory |
Configurations
History
No history.
Information
Published : 2018-12-11 17:29
Updated : 2024-02-04 20:03
NVD link : CVE-2018-19968
Mitre link : CVE-2018-19968
CVE.ORG link : CVE-2018-19968
JSON object : View
Products Affected
debian
- debian_linux
phpmyadmin
- phpmyadmin
CWE
CWE-200
Exposure of Sensitive Information to an Unauthorized Actor