CVE-2019-6798
Published: 26 January 2019
An issue was discovered in phpMyAdmin before 4.8.5. A vulnerability was reported where a specially crafted username can be used to trigger a SQL injection attack through the designer feature.
From the Ubuntu security team
It was discovered that phpMyAdmin failed to sanitize certain input. An attacker could use this vulnerability to execute an SQL injection attack via a specially crafted username.
Priority
CVSS 3 base score: 9.8
Status
Package | Release | Status |
---|---|---|
phpmyadmin Launchpad, Ubuntu, Debian |
Upstream |
Released
(4.8.5, 4:4.9.1+dfsg1-2)
|
Ubuntu 21.04 (Hirsute Hippo) |
Not vulnerable
(4:4.9.2+dfsg1-1)
|
|
Ubuntu 20.10 (Groovy Gorilla) |
Not vulnerable
(4:4.9.2+dfsg1-1)
|
|
Ubuntu 20.04 LTS (Focal Fossa) |
Not vulnerable
(4:4.9.2+dfsg1-1)
|
|
Ubuntu 18.04 LTS (Bionic Beaver) |
Released
(4:4.6.6-5ubuntu0.5)
|
|
Ubuntu 16.04 LTS (Xenial Xerus) |
Needed
|
|
Ubuntu 14.04 ESM (Trusty Tahr) |
Not vulnerable
(code not present)
|
|
Patches: Upstream: https://github.com/phpmyadmin/phpmyadmin/commit/469934cf7d3bd19a839eb78670590f7511399435 |