An issue was discovered in phpMyAdmin. With a crafted username or a table name, it was possible to inject SQL statements in the tracking functionality that would run with the privileges of the control user. This gives read and write access to the tables of the configuration storage database, and if the control user has the necessary privileges, read access to some tables of the MySQL database. All 4.6.x versions (prior to 4.6.5), 4.4.x versions (prior to 4.4.15.9), and 4.0.x versions (prior to 4.0.10.18) are affected.
References
Configurations
Configuration 1 (hide)
|
Configuration 2 (hide)
|
Configuration 3 (hide)
|
History
21 Nov 2024, 03:01
Type | Values Removed | Values Added |
---|---|---|
References | () http://www.securityfocus.com/bid/94533 - | |
References | () https://lists.debian.org/debian-lts-announce/2019/06/msg00009.html - | |
References | () https://security.gentoo.org/glsa/201701-32 - | |
References | () https://www.phpmyadmin.net/security/PMASA-2016-69 - Patch, Vendor Advisory |
Information
Published : 2016-12-11 03:00
Updated : 2024-11-21 03:01
NVD link : CVE-2016-9864
Mitre link : CVE-2016-9864
CVE.ORG link : CVE-2016-9864
JSON object : View
Products Affected
phpmyadmin
- phpmyadmin
CWE
CWE-89
Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')