GerdSchrewe
Basic Pleskian
Plesk 17.8.11 Update 55 - Ubuntu 18.04
current version is phpmyadmin 4.8.4-ubuntu18.04.build1708181212.18
Security - PMASA-2019-3
Date: 2019-05-06
Summary
SQL injection in Designer feature
Description
A vulnerability was reported where a specially crafted database name can be used to trigger an SQL injection attack through the designer feature.
Severity
We consider this vulnerability to be serious
Affected Versions
phpMyAdmin versions prior to 4.8.6 are affected.
Solution
Upgrade to phpMyAdmin 4.8.6 or newer or apply patch listed below.
Security - PMASA-2019-4
Date: 2019-06-04
Description
A vulnerability was found that allows an attacker to trigger a CSRF attack against a phpMyAdmin user. The attacker can trick the user, for instance through a broken <img> tag pointing at the victim's phpMyAdmin database, and the attacker can potentially deliver a payload (such as a specific INSERT or DELETE statement) through the victim.
Severity
We consider this vulnerability to be severe.
Mitigation factor
Only the 'cookie' auth_type is affected; users can temporary use phpMyAdmin's http authentication as a workaround.
Affected Versions
All versions prior to phpMyAdmin 4.9.0 are affected, probably at least as old as version 4.0 (perhaps even earlier)
Solution
Upgrade to phpMyAdmin 4.9.0 or newer or apply patch listed below.
Security - PMASA-2019-4
current version is phpmyadmin 4.8.4-ubuntu18.04.build1708181212.18
Security - PMASA-2019-3
Date: 2019-05-06
Summary
SQL injection in Designer feature
Description
A vulnerability was reported where a specially crafted database name can be used to trigger an SQL injection attack through the designer feature.
Severity
We consider this vulnerability to be serious
Affected Versions
phpMyAdmin versions prior to 4.8.6 are affected.
Solution
Upgrade to phpMyAdmin 4.8.6 or newer or apply patch listed below.
Security - PMASA-2019-4
Date: 2019-06-04
Description
A vulnerability was found that allows an attacker to trigger a CSRF attack against a phpMyAdmin user. The attacker can trick the user, for instance through a broken <img> tag pointing at the victim's phpMyAdmin database, and the attacker can potentially deliver a payload (such as a specific INSERT or DELETE statement) through the victim.
Severity
We consider this vulnerability to be severe.
Mitigation factor
Only the 'cookie' auth_type is affected; users can temporary use phpMyAdmin's http authentication as a workaround.
Affected Versions
All versions prior to phpMyAdmin 4.9.0 are affected, probably at least as old as version 4.0 (perhaps even earlier)
Solution
Upgrade to phpMyAdmin 4.9.0 or newer or apply patch listed below.
Security - PMASA-2019-4
Last edited: