An issue was discovered in phpMyAdmin. A specially crafted database name could be used to run arbitrary PHP commands through the array export feature. All 4.6.x versions (prior to 4.6.4), 4.4.x versions (prior to 4.4.15.8), and 4.0.x versions (prior to 4.0.10.17) are affected.
References
Link | Resource |
---|---|
https://www.phpmyadmin.net/security/PMASA-2016-32 | Vendor Advisory Patch |
http://www.securityfocus.com/bid/94112 | Third Party Advisory VDB Entry |
https://security.gentoo.org/glsa/201701-32 | |
https://lists.debian.org/debian-lts-announce/2018/07/msg00006.html |
Configurations
Configuration 1 (hide)
|
Configuration 2 (hide)
|
Configuration 3 (hide)
|
Information
Published : 2016-12-10 18:59
Updated : 2018-07-07 18:29
NVD link : CVE-2016-6609
Mitre link : CVE-2016-6609
JSON object : View
CWE
CWE-77
Improper Neutralization of Special Elements used in a Command ('Command Injection')
Products Affected
phpmyadmin
- phpmyadmin