An issue was discovered in phpMyAdmin. A user can execute a remote code execution attack against a server when phpMyAdmin is being run as a CGI application. Under certain server configurations, a user can pass a query string which is executed as a command-line argument by the file generator_plugin.sh. All 4.6.x versions (prior to 4.6.4), 4.4.x versions (prior to 4.4.15.8), and 4.0.x versions (prior to 4.0.10.17) are affected.
The product constructs all or part of an OS command using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify the intended OS command when it is sent to a downstream component.
Link | Tags |
---|---|
http://www.securityfocus.com/bid/92496 | third party advisory vdb entry |
https://security.gentoo.org/glsa/201701-32 | vendor advisory |
https://www.phpmyadmin.net/security/PMASA-2016-54 | patch vendor advisory |
https://lists.debian.org/debian-lts-announce/2019/06/msg00009.html | mailing list |