CVE-2020-10803
MediumVulnerability Description
In phpMyAdmin 4.x before 4.9.5 and 5.x before 5.0.2, a SQL injection vulnerability was discovered where malicious code could be used to trigger an XSS attack through retrieving and displaying results (in tbl_get_field.php and libraries/classes/Display/Results.php). The attacker must be able to insert crafted data into certain database tables, which when retrieved (for instance, through the Browse tab) can trigger the XSS attack.
CVSS Metrics
Common Vulnerability Scoring System
Vector String:
CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N
Known Affected Software
7 configuration(s) from 4 vendor(s)
cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*
cpe:2.3:o:fedoraproject:fedora:30:*:*:*:*:*:*:*
cpe:2.3:o:fedoraproject:fedora:31:*:*:*:*:*:*:*
cpe:2.3:o:fedoraproject:fedora:32:*:*:*:*:*:*:*
cpe:2.3:a:opensuse:backports_sle:15.0:sp3:*:*:*:*:*:*
cpe:2.3:o:opensuse:leap:15.1:*:*:*:*:*:*:*
cpe:2.3:a:suse:package_hub:-:*:*:*:*:*:*:*
References & Resources
-
http://lists.opensuse.org/opensuse-security-announce/2020-03/msg00046.htmlcve@mitre.org Broken Link Mailing List Third Party Advisory
-
http://lists.opensuse.org/opensuse-security-announce/2020-03/msg00050.htmlcve@mitre.org Broken Link Mailing List Third Party Advisory
-
http://lists.opensuse.org/opensuse-security-announce/2020-11/msg00005.htmlcve@mitre.org Broken Link Mailing List Third Party Advisory
-
https://lists.debian.org/debian-lts-announce/2020/03/msg00028.htmlcve@mitre.org Mailing List Third Party Advisory
-
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/AAVW3SUKWR5RF5LZ6SARCYOWBIFUIWOJ/cve@mitre.org
-
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/BUG3IRITW2LUBGR5LSQMP7MVRTELHZJK/cve@mitre.org
-
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/UZI6EQVRRIG252DY3MBT33BJVCSYDMQO/cve@mitre.org
-
https://www.phpmyadmin.net/security/PMASA-2020-4/cve@mitre.org Patch Vendor Advisory
-
http://lists.opensuse.org/opensuse-security-announce/2020-03/msg00046.htmlaf854a3a-2127-422b-91ae-364da2661108 Broken Link Mailing List Third Party Advisory
-
http://lists.opensuse.org/opensuse-security-announce/2020-03/msg00050.htmlaf854a3a-2127-422b-91ae-364da2661108 Broken Link Mailing List Third Party Advisory
-
http://lists.opensuse.org/opensuse-security-announce/2020-11/msg00005.htmlaf854a3a-2127-422b-91ae-364da2661108 Broken Link Mailing List Third Party Advisory
-
https://lists.debian.org/debian-lts-announce/2020/03/msg00028.htmlaf854a3a-2127-422b-91ae-364da2661108 Mailing List Third Party Advisory
-
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/AAVW3SUKWR5RF5LZ6SARCYOWBIFUIWOJ/af854a3a-2127-422b-91ae-364da2661108
-
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/BUG3IRITW2LUBGR5LSQMP7MVRTELHZJK/af854a3a-2127-422b-91ae-364da2661108
-
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/UZI6EQVRRIG252DY3MBT33BJVCSYDMQO/af854a3a-2127-422b-91ae-364da2661108
-
https://www.phpmyadmin.net/security/PMASA-2020-4/af854a3a-2127-422b-91ae-364da2661108 Patch Vendor Advisory
Severity Details
Weakness Type (CWE)
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')
- Description
- The product does not neutralize or incorrectly neutralizes user-controllable input before it is placed in output that is used as a web page that is served to other users.
- Exploit Likelihood
- High
- Typical Severity
- Medium
- OWASP Top 10
- A03:2021-Injection
- Abstraction Level
- Base
Key Information
- Published Date
- March 22, 2020
