DescriptionAn issue was discovered in phpMyAdmin 4.8.x before 4.8.2, in which an attacker can include (view and potentially execute) files on the server. The vulnerability comes from a portion of code where pages are redirected and loaded within phpMyAdmin, and an improper test for whitelisted pages. An attacker must be authenticated, except in the "$cfg['AllowArbitraryServer'] = true" case (where an attacker can specify any host he/she is already in control of, and execute arbitrary code on phpMyAdmin) and the "$cfg['ServerDefault'] = 0" case (which bypasses the login requirement and runs the vulnerable code without any authentication).
Overall state of this security issue: Resolved
This issue is currently rated as having moderate severity.
|National Vulnerability Database|
- openSUSE-SU-2018:1806-1, published Sat, 23 Jun 2018 15:08:44 +0200 (CEST)
- openSUSE-SU-2018:1809-1, published Sat, 23 Jun 2018 15:10:01 +0200 (CEST)
List of released packages
|Product(s)||Fixed package version(s)||References|
|SUSE Package Hub for SUSE Linux Enterprise 12|| ||Patchnames:
|openSUSE Leap 15.0|| ||Patchnames:
|openSUSE Leap 42.3|| ||Patchnames:
Status of this issue by product and package
Please note that this evaluation state might be work in progress, incomplete or outdated. Also information for service packs in the LTSS phase is only included for issues meeting the LTSS criteria. If in doubt, feel free to contact us for clarification.
|CaaS Platform 2.0||qemu||Released|
|CaaS Platform 3.0||qemu||Released|
|SUSE Linux Enterprise Desktop 12 SP3||qemu||Released|
|SUSE Linux Enterprise Module for Basesystem 15 GA||qemu||Released|
|SUSE Linux Enterprise Module for Server Applications 15 GA||qemu||Released|
|SUSE Linux Enterprise Server 12 GA LTSS||qemu||Released|
|SUSE Linux Enterprise Server 12 SP1 LTSS||qemu||Released|
|SUSE Linux Enterprise Server 12 SP2 LTSS||qemu||Released|
|SUSE Linux Enterprise Server 12 SP3||qemu||Released|
|SUSE Linux Enterprise Server for SAP Applications 12 SP2||qemu||Released|