CVE-2020-10803
Publication date 22 March 2020
Last updated 24 July 2024
Ubuntu priority
Cvss 3 Severity Score
In phpMyAdmin 4.x before 4.9.5 and 5.x before 5.0.2, a SQL injection vulnerability was discovered where malicious code could be used to trigger an XSS attack through retrieving and displaying results (in tbl_get_field.php and libraries/classes/Display/Results.php). The attacker must be able to insert crafted data into certain database tables, which when retrieved (for instance, through the Browse tab) can trigger the XSS attack.
From the Ubuntu Security Team
It was discovered that phpMyAdmin did not properly handle data from the database when displaying it. If an attacker were to insert specially-crafted data into certain database tables, the attacker could execute a cross-site scripting (XSS) attack.
Status
Package | Ubuntu Release | Status |
---|---|---|
phpmyadmin | 24.10 oracular |
Not affected
|
24.04 LTS noble |
Not affected
|
|
22.04 LTS jammy |
Not affected
|
|
20.04 LTS focal |
Not affected
|
|
18.04 LTS bionic |
Fixed 4:4.6.6-5ubuntu0.5
|
|
16.04 LTS xenial |
Vulnerable
|
|
14.04 LTS trusty | Ignored end of ESM support, was needed |
Severity score breakdown
Parameter | Value |
---|---|
Base score |
|
Attack vector | Network |
Attack complexity | Low |
Privileges required | Low |
User interaction | Required |
Scope | Changed |
Confidentiality | Low |
Integrity impact | Low |
Availability impact | None |
Vector | CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N |
References
Related Ubuntu Security Notices (USN)
- USN-4639-1
- phpMyAdmin vulnerabilities
- 19 November 2020
Other references
- https://www.phpmyadmin.net/security/PMASA-2020-4/
- https://github.com/phpmyadmin/phpmyadmin/commit/46a7aa7cd4ff2be0eeb23721fbf71567bebe69a5
- https://github.com/phpmyadmin/phpmyadmin/commit/6b9b2601d8af916659cde8aefd3a6eaadd10284a
- https://lists.debian.org/debian-lts-announce/2020/03/msg00028.html
- https://www.cve.org/CVERecord?id=CVE-2020-10803