CVE-2020-26934
Published: 10 October 2020
phpMyAdmin before 4.9.6 and 5.x before 5.0.3 allows XSS through the transformation feature via a crafted link.
From the Ubuntu Security Team
It was discovered that phpMyAdmin was vulnerable to an XSS attack. If a victim were to click on a crafted link, an attacker could run malicious JavaScript on the victim's system.
Notes
Author | Note |
---|---|
mdeslaur |
vulerability was introduced in 2.5.0. File where issue is is different in bionic and earlier. |
litios |
intrusive patch for xenial and earlier as the signing funcionality is not present. |
Priority
Status
Package | Release | Status |
---|---|---|
phpmyadmin
Launchpad, Ubuntu, Debian |
bionic |
Released
(4:4.6.6-5ubuntu0.5)
|
focal |
Released
(4:4.9.5+dfsg1-2ubuntu0.1~esm1)
Available with Ubuntu Pro |
|
groovy |
Not vulnerable
(4:4.9.7+dfsg1-1)
|
|
hirsute |
Not vulnerable
(4:4.9.7+dfsg1-1)
|
|
impish |
Not vulnerable
(4:4.9.7+dfsg1-1)
|
|
jammy |
Not vulnerable
(4:4.9.7+dfsg1-1)
|
|
kinetic |
Not vulnerable
(4:4.9.7+dfsg1-1)
|
|
lunar |
Not vulnerable
(4:4.9.7+dfsg1-1)
|
|
mantic |
Not vulnerable
(4:4.9.7+dfsg1-1)
|
|
noble |
Not vulnerable
(4:4.9.7+dfsg1-1)
|
|
trusty |
Needed
|
|
upstream |
Needs triage
|
|
xenial |
Needed
|
Severity score breakdown
Parameter | Value |
---|---|
Base score | 6.1 |
Attack vector | Network |
Attack complexity | Low |
Privileges required | None |
User interaction | Required |
Scope | Changed |
Confidentiality | Low |
Integrity impact | Low |
Availability impact | None |
Vector | CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N |
References
- https://www.phpmyadmin.net/security/PMASA-2020-5/
- https://github.com/phpmyadmin/phpmyadmin/commit/19df63b0365621427697edc185ff7c9c5707c523
- https://ubuntu.com/security/notices/USN-4639-1
- https://ubuntu.com/security/notices/USN-4843-1
- https://www.cve.org/CVERecord?id=CVE-2020-26934
- NVD
- Launchpad
- Debian