An attacker can exploit phpMyAdmin before 4.8.4 to leak the contents of a local file because of an error in the transformation feature. The attacker must have access to the phpMyAdmin Configuration Storage tables, although these can easily be created in any database to which the attacker has access. An attacker must have valid credentials to log in to phpMyAdmin; this vulnerability does not allow an attacker to circumvent the login system.
References
Link | Resource |
---|---|
https://www.phpmyadmin.net/security/PMASA-2018-6/ | Patch Vendor Advisory |
http://www.securityfocus.com/bid/106178 | Third Party Advisory VDB Entry |
https://lists.debian.org/debian-lts-announce/2019/02/msg00003.html | Mailing List Third Party Advisory |
https://security.gentoo.org/glsa/201904-16 | Third Party Advisory |
Information
Published : 2018-12-11 09:29
Updated : 2019-04-23 05:36
NVD link : CVE-2018-19968
Mitre link : CVE-2018-19968
JSON object : View
CWE
CWE-200
Exposure of Sensitive Information to an Unauthorized Actor
Products Affected
debian
- debian_linux
phpmyadmin
- phpmyadmin