-
CVSS Score
-| Package Name | Ecosystem | Vulnerable Versions | First Patched Version |
|---|---|---|---|
| phpmyadmin/phpmyadmin | composer | >= 4.6, < 4.6.4 | 4.6.4 |
| phpmyadmin/phpmyadmin | composer | >= 4.4, < 4.4.15.8 | 4.4.15.8 |
| phpmyadmin/phpmyadmin | composer | >= 4.0, < 4.0.10.17 | 4.0.10.17 |
The vulnerability stems from improper validation of the 'server' parameter derived from cookies against the ArbitraryServerRegexp configuration. The patches introduce regex checks in server selection/sanitization functions. Based on phpMyAdmin's architecture and commit messages referencing server validation fixes, PMA_selectServer (server selection handler) and PMA_Util::sanitizeServer (input sanitizer) are the most likely candidates that processed untrusted input without proper validation in vulnerable versions. These functions would appear in stack traces when handling authentication requests with malicious server parameters.
A Semantic Attack on Google Gemini - Read the Latest Research