You are here
Home > Preporuke > Sigurnosni nedostaci programskog paketa phpMyAdmin

Sigurnosni nedostaci programskog paketa phpMyAdmin

——————————————————————————–
Fedora Update Notification
FEDORA-2020-25f3aea389
2020-04-01 02:35:47.694723
——————————————————————————–

Name : phpMyAdmin
Product : Fedora 30
Version : 4.9.5
Release : 1.fc30
URL : https://www.phpmyadmin.net/
Summary : Handle the administration of MySQL over the World Wide Web
Description :
phpMyAdmin is a tool written in PHP intended to handle the administration of
MySQL over the World Wide Web. Most frequently used operations are supported
by the user interface (managing databases, tables, fields, relations, indexes,
users, permissions), while you still have the ability to directly execute any
SQL statement.

Features include an intuitive web interface, support for most MySQL features
(browse and drop databases, tables, views, fields and indexes, create, copy,
drop, rename and alter databases, tables, fields and indexes, maintenance
server, databases and tables, with proposals on server configuration, execute,
edit and bookmark any SQL-statement, even batch-queries, manage MySQL users
and privileges, manage stored procedures and triggers), import data from CSV
and SQL, export data to various formats: CSV, SQL, XML, PDF, OpenDocument Text
and Spreadsheet, Word, Excel, LATEX and others, administering multiple servers,
creating PDF graphics of your database layout, creating complex queries using
Query-by-example (QBE), searching globally in a database or a subset of it,
transforming stored data into any format using a set of predefined functions,
like displaying BLOB-data as image or download-link and much more…

——————————————————————————–
Update Information:

The **phpMyAdmin** team announces the release of both **4.9.5** and **5.0.2**.
Both versions contain several security fixes: * PMASA-2020-2 SQL injection
vulnerability in the user accounts page, particularly when changing a password *
PMASA-2020-3 SQL injection vulnerability relating to the search feature *
PMASA-2020-4 SQL injection and XSS having to do with displaying results *
Removing of the “options” field for the external transformation. There are many
other bugs fixes, please see the ChangeLog file included with this release for
full details.
——————————————————————————–
ChangeLog:

* Mon Mar 23 2020 Remi Collet <remi@remirepo.net> – 4.9.5-1
– update to 4.9.5 (2020-03-21, security release)
——————————————————————————–
References:

[ 1 ] Bug #1816097 – CVE-2020-10804 phpMyAdmin: SQL injection was found in retrieval of the current username which could result privilege escalation
https://bugzilla.redhat.com/show_bug.cgi?id=1816097
[ 2 ] Bug #1816131 – CVE-2020-10803 phpMyAdmin: Inserting specially crafted code in database tables, retrieving and displaying resuts could result in XSS
https://bugzilla.redhat.com/show_bug.cgi?id=1816131
[ 3 ] Bug #1816144 – CVE-2020-10802 phpMyAdmin: SQL injection was found in generating certain queries for search actions which could result in malicious D M
https://bugzilla.redhat.com/show_bug.cgi?id=1816144
——————————————————————————–

This update can be installed with the “dnf” update program. Use
su -c ‘dnf upgrade –advisory FEDORA-2020-25f3aea389’ at the command
line. For more information, refer to the dnf documentation available at
http://dnf.readthedocs.io/en/latest/command_ref.html#upgrade-command-label

All packages are signed with the Fedora Project GPG key. More details on the
GPG keys used by the Fedora Project can be found at
https://fedoraproject.org/keys
——————————————————————————–
_______________________________________________
package-announce mailing list — package-announce@lists.fedoraproject.org
To unsubscribe send an email to package-announce-leave@lists.fedoraproject.org
Fedora Code of Conduct: https://docs.fedoraproject.org/en-US/project/code-of-conduct/
List Guidelines: https://fedoraproject.org/wiki/Mailing_list_guidelines
List Archives: https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org

——————————————————————————–
Fedora Update Notification
FEDORA-2020-d7b0a5a84a
2020-04-01 01:54:46.132874
——————————————————————————–

Name : phpMyAdmin
Product : Fedora 31
Version : 5.0.2
Release : 1.fc31
URL : https://www.phpmyadmin.net/
Summary : A web interface for MySQL and MariaDB
Description :
phpMyAdmin is a tool written in PHP intended to handle the administration of
MySQL over the Web. Currently it can create and drop databases,
create/drop/alter tables, delete/edit/add fields, execute any SQL statement,
manage keys on fields, manage privileges,export data into various formats and
is available in 50 languages

——————————————————————————–
Update Information:

The **phpMyAdmin** team announces the release of both **4.9.5** and **5.0.2**.
Both versions contain several security fixes: * PMASA-2020-2 SQL injection
vulnerability in the user accounts page, particularly when changing a password *
PMASA-2020-3 SQL injection vulnerability relating to the search feature *
PMASA-2020-4 SQL injection and XSS having to do with displaying results *
Removing of the “options” field for the external transformation. There are many
other bugs fixes, please see the ChangeLog file included with this release for
full details.
——————————————————————————–
ChangeLog:

* Sat Mar 21 2020 Remi Collet <remi@remirepo.net> 5.0.2-1
– update to 5.0.2 (2020-03-21, security release)
– use phpmyadmin/twig-i18n-extension instead of twig/extensions
——————————————————————————–
References:

[ 1 ] Bug #1816097 – CVE-2020-10804 phpMyAdmin: SQL injection was found in retrieval of the current username which could result privilege escalation
https://bugzilla.redhat.com/show_bug.cgi?id=1816097
[ 2 ] Bug #1816131 – CVE-2020-10803 phpMyAdmin: Inserting specially crafted code in database tables, retrieving and displaying resuts could result in XSS
https://bugzilla.redhat.com/show_bug.cgi?id=1816131
[ 3 ] Bug #1816144 – CVE-2020-10802 phpMyAdmin: SQL injection was found in generating certain queries for search actions which could result in malicious D M
https://bugzilla.redhat.com/show_bug.cgi?id=1816144
——————————————————————————–

This update can be installed with the “dnf” update program. Use
su -c ‘dnf upgrade –advisory FEDORA-2020-d7b0a5a84a’ at the command
line. For more information, refer to the dnf documentation available at
http://dnf.readthedocs.io/en/latest/command_ref.html#upgrade-command-label

All packages are signed with the Fedora Project GPG key. More details on the
GPG keys used by the Fedora Project can be found at
https://fedoraproject.org/keys
——————————————————————————–
_______________________________________________
package-announce mailing list — package-announce@lists.fedoraproject.org
To unsubscribe send an email to package-announce-leave@lists.fedoraproject.org
Fedora Code of Conduct: https://docs.fedoraproject.org/en-US/project/code-of-conduct/
List Guidelines: https://fedoraproject.org/wiki/Mailing_list_guidelines
List Archives: https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org

Top
More in Preporuke
Sigurnosni nedostatak programskog paketa mod_auth_mellon

Otkriven je sigurnosni nedostatak u programskom paketu mod_auth_mellon za operacijski sustav RHEL. Otkriveni nedostatak potencijalnim udaljenim napadačima omogućuje preusmjeravanje na...

Close