An issue was discovered in phpMyAdmin. A specially crafted database name could be used to run arbitrary PHP commands through the array export feature. All 4.6.x versions (prior to 4.6.4), 4.4.x versions (prior to 4.4.15.8), and 4.0.x versions (prior to 4.0.10.17) are affected.
References
Link | Resource |
---|---|
http://www.securityfocus.com/bid/94112 | Third Party Advisory VDB Entry |
https://lists.debian.org/debian-lts-announce/2018/07/msg00006.html | |
https://security.gentoo.org/glsa/201701-32 | |
https://www.phpmyadmin.net/security/PMASA-2016-32 | Vendor Advisory Patch |
Configurations
Configuration 1 (hide)
|
Configuration 2 (hide)
|
Configuration 3 (hide)
|
History
No history.
Information
Published : 2016-12-11 02:59
Updated : 2018-07-08 01:29
NVD link : CVE-2016-6609
Mitre link : CVE-2016-6609
CVE.ORG link : CVE-2016-6609
JSON object : View
Products Affected
phpmyadmin
- phpmyadmin
CWE
CWE-77
Improper Neutralization of Special Elements used in a Command ('Command Injection')