In phpMyAdmin 4 before 4.9.4 and 5 before 5.0.1, SQL injection exists in the user accounts page. A malicious user could inject custom SQL in place of their own username when creating queries to this page. An attacker must have a valid MySQL account to access the server.
The product constructs all or part of an SQL command using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify the intended SQL command when it is sent to a downstream component. Without sufficient removal or quoting of SQL syntax in user-controllable inputs, the generated SQL query can cause those inputs to be interpreted as SQL instead of ordinary user data.
Link | Tags |
---|---|
https://www.phpmyadmin.net/security/PMASA-2020-1/ | patch vendor advisory |
http://lists.opensuse.org/opensuse-security-announce/2020-01/msg00024.html | mailing list third party advisory vendor advisory |
https://lists.debian.org/debian-lts-announce/2020/01/msg00011.html | third party advisory mailing list |
https://cybersecurityworks.com/zerodays/cve-2020-5504-phpmyadmin.html | third party advisory exploit |
https://github.com/MarkLee131/awesome-web-pocs/blob/main/CVE-2020-5504.md |