Arbitrary Code Execution Affecting phpmyadmin/phpmyadmin package, versions >=4.0.0, <4.0.10.16 >=4.1.0, <4.4.15.7 >=4.5.0, <4.6.3
Threat Intelligence
Exploit Maturity
Mature
EPSS
91.67% (100th
percentile)
Do your applications use this vulnerable package?
In a few clicks we can analyze your entire application and see what components are vulnerable in your application, and suggest you quick fixes.
Test your applications- Snyk ID SNYK-PHP-PHPMYADMINPHPMYADMIN-3021219
- published 12 Sep 2022
- disclosed 12 Sep 2022
- credit Michal Čihař and Cure53
Introduced: 12 Sep 2022
CVE-2016-5734 Open this link in a new tabHow to fix?
Upgrade phpmyadmin/phpmyadmin
to version 4.0.10.16, 4.4.15.7, 4.6.3 or higher.
Overview
phpmyadmin/phpmyadmin is a web interface for MySQL and MariaDB.
Affected versions of this package are vulnerable to Arbitrary Code Execution via a crafted string. This is because it does not properly choose delimiters to prevent the use of the preg_replace
function.
References
CVSS Scores
version 3.1