Miggo Logo

CVE-2020-10804: phpMyAdmin SQL Injection

8

CVSS Score
3.1

Basic Information

EPSS Score
0.85913%
Published
5/24/2022
Updated
4/24/2024
KEV Status
No
Technology
TechnologyPHP

Technical Details

CVSS Vector
CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H
Package NameEcosystemVulnerable VersionsFirst Patched Version
phpmyadmin/phpmyadmincomposer>= 4.9.0, < 4.9.54.9.5
phpmyadmin/phpmyadmincomposer>= 5.0.0, < 5.0.25.0.2

Vulnerability Intelligence
Miggo AIMiggo AI

Miggo AIRoot Cause Analysis

The vulnerability manifests in username handling during account management operations. Both files mentioned in advisories (Privileges.php and UserPassword.php) contain user management functionality. The SQL injection occurs when: 1) Retrieving user context for privilege operations 2) Processing username during password changes. The commits 89fbcd7c and 3258978c likely added proper escaping/parameterization for username values in SQL queries. High confidence comes from explicit file references in multiple sources and the nature of described attack vectors (privilege/password operations).

Vulnerable functions

Only Mi**o us*rs **n s** t*is s**tion

WAF Protection Rules

WAF Rule

In p*pMy**min *.x ***or* *.*.* *n* *.x ***or* *.*.*, * SQL inj**tion vuln*r**ility w*s *oun* in r*tri*v*l o* t** *urr*nt us*rn*m* (in li*r*ri*s/*l*ss*s/S*rv*r/Privil***s.p*p *n* li*r*ri*s/*l*ss*s/Us*rP*sswor*.p*p). * m*li*ious us*r wit* ****ss to t**

Reasoning

T** vuln*r**ility m*ni**sts in us*rn*m* **n*lin* *urin* ***ount m*n***m*nt op*r*tions. *ot* *il*s m*ntion** in **visori*s (`Privil***s.p*p` *n* `Us*rP*sswor*.p*p`) *ont*in us*r m*n***m*nt *un*tion*lity. T** SQL inj**tion o**urs w**n: *) R*tri*vin* us