CVE-2021-21311:
SSRF in adminer
7.2
CVSS Score
3.1
Basic Information
CVE ID
GHSA ID
EPSS Score
0.99451%
CWE
Published
2/11/2021
Updated
2/1/2023
KEV Status
No
Technology
PHP
Technical Details
CVSS Vector
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:L/I:L/A:N
Package Name | Ecosystem | Vulnerable Versions | First Patched Version |
---|---|---|---|
vrana/adminer | composer | < 4.7.9 | 4.7.9 |
Vulnerability Intelligence
Miggo AI
Root Cause Analysis
The commit ccd2374b patched SSRF by modifying error handling in both drivers. Previously, when HTTP status codes weren't 200, these functions set error messages using the raw server response ($file). This allowed attackers to: 1) Force Adminer
to make arbitrary HTTP requests (SSRF vector) 2) Read response contents through error messages. The vulnerability manifests in functions handling Elasticsearch
and ClickHouse
driver communications, where improper error message construction leaked internal service data.