{"id":"UBUNTU-CVE-2020-10802","details":"In phpMyAdmin 4.x before 4.9.5 and 5.x before 5.0.2, a SQL injection vulnerability has been discovered where certain parameters are not properly escaped when generating certain queries for search actions in libraries/classes/Controllers/Table/TableSearchController.php. An attacker can generate a crafted database or table name. The attack can be performed if a user attempts certain search operations on the malicious database or table.","modified":"2026-02-04T04:32:01.838696Z","published":"2020-03-22T05:15:00Z","related":["USN-4639-1"],"upstream":["CVE-2020-10802"],"references":[{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2020-10802"},{"type":"REPORT","url":"https://www.phpmyadmin.net/security/PMASA-2020-3/"},{"type":"REPORT","url":"https://github.com/phpmyadmin/phpmyadmin/commit/a8acd7a42cf743186528b0453f90aaa32bfefabe"},{"type":"REPORT","url":"https://lists.debian.org/debian-lts-announce/2020/03/msg00028.html"},{"type":"ADVISORY","url":"https://ubuntu.com/security/notices/USN-4639-1"},{"type":"REPORT","url":"https://www.cve.org/CVERecord?id=CVE-2020-10802"}],"affected":[{"package":{"name":"phpmyadmin","ecosystem":"Ubuntu:Pro:14.04:LTS","purl":"pkg:deb/ubuntu/phpmyadmin@4:4.0.10-1ubuntu0.1+esm4?arch=source&distro=esm-infra-legacy/trusty"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"}]}],"versions":["4:4.0.6-1","4:4.0.8-1","4:4.0.9-1","4:4.0.10-1","4:4.0.10-1ubuntu0.1","4:4.0.10-1ubuntu0.1+esm1","4:4.0.10-1ubuntu0.1+esm2","4:4.0.10-1ubuntu0.1+esm3","4:4.0.10-1ubuntu0.1+esm4"],"ecosystem_specific":{"binaries":[{"binary_version":"4:4.0.10-1ubuntu0.1+esm4","binary_name":"phpmyadmin"}]},"database_specific":{"source":"https://github.com/canonical/ubuntu-security-notices/blob/main/osv/cve/2020/UBUNTU-CVE-2020-10802.json"}},{"package":{"name":"phpmyadmin","ecosystem":"Ubuntu:Pro:16.04:LTS","purl":"pkg:deb/ubuntu/phpmyadmin@4:4.5.4.1-2ubuntu2.1+esm6?arch=source&distro=esm-apps/xenial"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"}]}],"versions":["4:4.4.13.1-1","4:4.5.0.2-2","4:4.5.1-1","4:4.5.1-2","4:4.5.1-3","4:4.5.2-1","4:4.5.2-2","4:4.5.3.1-1","4:4.5.4-1","4:4.5.4.1-2","4:4.5.4.1-2ubuntu1","4:4.5.4.1-2ubuntu2","4:4.5.4.1-2ubuntu2.1","4:4.5.4.1-2ubuntu2.1+esm2","4:4.5.4.1-2ubuntu2.1+esm3","4:4.5.4.1-2ubuntu2.1+esm4","4:4.5.4.1-2ubuntu2.1+esm5","4:4.5.4.1-2ubuntu2.1+esm6"],"ecosystem_specific":{"binaries":[{"binary_version":"4:4.5.4.1-2ubuntu2.1+esm6","binary_name":"phpmyadmin"}]},"database_specific":{"source":"https://github.com/canonical/ubuntu-security-notices/blob/main/osv/cve/2020/UBUNTU-CVE-2020-10802.json"}},{"package":{"name":"phpmyadmin","ecosystem":"Ubuntu:18.04:LTS","purl":"pkg:deb/ubuntu/phpmyadmin@4:4.6.6-5ubuntu0.5?arch=source&distro=bionic"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"4:4.6.6-5ubuntu0.5"}]}],"versions":["4:4.6.6-5"],"ecosystem_specific":{"availability":"No subscription required","binaries":[{"binary_version":"4:4.6.6-5ubuntu0.5","binary_name":"phpmyadmin"}]},"database_specific":{"source":"https://github.com/canonical/ubuntu-security-notices/blob/main/osv/cve/2020/UBUNTU-CVE-2020-10802.json"}}],"schema_version":"1.7.3","severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H"},{"type":"Ubuntu","score":"medium"}]}