CVE-2017-18264: phpMyAdmin Improper Privilege Management
9.8
CVSS Score
3.0
Basic Information
CVE ID
GHSA ID
EPSS Score
0.6656%
CWE
Published
5/13/2022
Updated
4/24/2024
KEV Status
No
Technology
PHP
Technical Details
CVSS Vector
CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
Package Name | Ecosystem | Vulnerable Versions | First Patched Version |
---|---|---|---|
phpmyadmin/phpmyadmin | composer | >= 4.0, < 4.0.10.20 | 4.0.10.20 |
phpmyadmin/phpmyadmin | composer | >= 4.7.0-beta1, < 4.7.0 | 4.7.0 |
phpmyadmin/phpmyadmin | composer | >= 4.4.0, <= 4.4.15.10 | |
phpmyadmin/phpmyadmin | composer | >= 4.6.0, <= 4.6.6 |
Vulnerability Intelligence
Miggo AI
Root Cause Analysis
The vulnerability stems from improper handling of empty passwords via PHP's substr()
function in the authentication logic. The phpMyAdmin
security advisory explicitly identifies the interaction between $cfg['Servers'][$i]['AllowNoPassword']
and PHP's substr()
behavior as the root cause. Though the exact function name isn't specified in the provided materials, the file path (libraries/common.inc.php
) and the function's role in password validation are confirmed in multiple sources. The substr()
usage in this context directly enables the privilege escalation bypass, meeting high confidence criteria.