{"id":"USN-4843-1","summary":"phpmyadmin vulnerabilities","details":"Javier Nieto and Andres Rojas discovered that phpMyAdmin incorrectly\nmanaged input in the form of passwords. An attacker could use this\nvulnerability to cause a denial-of-service (DoS). This issue only\naffected Ubuntu 14.04 ESM. (CVE-2014-9218)\n\nEmanuel Bronshtein discovered that phpMyAdmin failed to properly sanitize\ninput in the form of database names in the PHP Array export feature.\nAn authenticated attacker could use this vulnerability to run arbitrary\nPHP commands. This issue only affected Ubuntu 14.04 ESM and Ubuntu 16.04 ESM.\n(CVE-2016-6609)\n\nEmanuel Bronshtein discovered that phpMyAdmin failed to properly sanitize\ninput. An attacker could use this vulnerability to execute SQL injection\nattacks. This issue only affected Ubuntu 14.04 ESM and Ubuntu 16.04 ESM.\n(CVE-2016-6619)\n\nEmanuel Bronshtein discovered that phpMyadmin failed to properly sanitize\ninput. An authenticated attacker could use this vulnerability to cause a\ndenial-of-service (DoS). This issue only affected Ubuntu 14.04 ESM and\nUbuntu 16.04 ESM. (CVE-2016-6630)\n\nEmanuel Bronshtein discovered that phpMyAdmin failed to properly sanitize\ninput. An attacker could use this vulnerability to bypass AllowRoot\nrestrictions and deny rules for usernames. This issue only affected Ubuntu\n14.04 ESM and Ubuntu 16.04 ESM. (CVE-2016-9849)\n\nEmanuel Bronshtein discovered that phpMyAdmin would allow sensitive\ninformation to be leaked when the argument separator in a URL was\nnot the default & value. An attacker could use this vulnerability to\nobtain the CSRF token of a user. This issue only affected Ubuntu\n14.04 ESM and Ubuntu 16.04 ESM. (CVE-2016-9866)\n\nIsaac Bennetch discovered that phpMyAdmin was incorrectly restricting\nuser access due to the behavior of the substr function on some PHP\nversions. An attacker could use this vulnerability to bypass login\nrestrictions established for users that have no password set. This\nissue only affected Ubuntu 14.04 ESM. This issue only affected Ubuntu\n14.04 ESM and Ubuntu 16.04 ESM. (CVE-2017-18264)\n\nEmanuel Bronshtein discovered that phpMyAdmin failed to properly sanitize\ninput in the form of parameters sent during a table editing operation. An\nattacker could use this vulnerability to trigger an endless recursion\nand cause a denial-of-service (DoS). This issue only affected Ubuntu 14.04\nESM and Ubuntu 16.04 ESM. (CVE-2017-1000014)\n\nEmanuel Bronshtein discovered that phpMyAdmin failed to properly sanitize\ninput used to generate a web page. An authenticated attacker could use this\nvulnerability to execute CSS injection attacks. This issue only affected\nUbuntu 14.04 ESM and Ubuntu 16.04 ESM. (CVE-2017-1000015)\n\nIt was discovered that phpMyAdmin incorrectly handled certain input. An\nattacker could use this vulnerability to execute a cross-site scripting (XSS)\nattack via a crafted URL. This issue only affected Ubuntu 16.04 ESM.\n(CVE-2018-7260)\n\nIt was discovered phpMyAdmin incorrectly handled database names. An\nattacker could possibly use this to trigger a cross-site scripting\nattack. This issue only affected Ubuntu 16.04 ESM and Ubuntu 18.04 ESM.\n(CVE-2018-12581)\n\nDaniel Le Gall discovered that phpMyAdmin would expose sensitive\ninformation to unauthorized actors due to an error in its transformation\nfeature. An authenticated attacker could use this vulnerability to leak\nthe contents of a local file. This issue only affected Ubuntu 14.04 ESM\nand Ubuntu 16.04 ESM. (CVE-2018-19968)\n\nIt was discovered that phpMyAdmin incorrectly handled user input. An\nattacker could possibly use this to perform a cross-site scripting attack.\nThis issue only affected Ubuntu 16.04 ESM. (CVE-2018-19970)\n\nIt was discovered that phpMyAdmin failed to properly sanitize input. An\nattacker could use this vulnerability to execute an SQL injection attack\nvia a specially crafted database name. This issue only affected Ubuntu\n16.04 ESM. (CVE-2019-11768)\n\nIt was discovered that phpMyAdmin incorrectly handled some requests. An\nattacker could possibly use this to perform a cross site request forgery\nattack. This issue only affected Ubuntu 16.04 ESM. (CVE-2019-12616)\n\nIt was discovered that phpMyAdmin incorrectly handled some requests. An\nattacker could possibly use this to perform a cross site request forgery\nattack. This issue only affected Ubuntu 14.04 ESM and Ubuntu 18.04 ESM.\n(CVE-2019-12922)\n\nIt was discovered that phpMyAdmin failed to properly sanitize input. An\nattacker could use this vulnerability to execute an SQL injection attack\nvia a specially crafted username. This issue only affected Ubuntu 16.04 ESM.\n(CVE-2019-6798)\n\nIt was discovered that phpMyAdmin did not properly sanitize certain input.\nAn attacker could use this vulnerability to possibly execute an HTML injection\nor a cross-site scripting (XSS) attack. This issue only affected Ubuntu 14.04\nESM and Ubuntu 16.04 ESM. (CVE-2019-19617)\n\nCSW Research Labs discovered that phpMyAdmin failed to properly sanitize\ninput.  An attacker could use this vulnerability to execute SQL injection\nattacks. This issue only affected Ubuntu 16.04 ESM. (CVE-2020-5504)\n\nGiwan Go and Yelang Lee discovered that phpMyAdmin was vulnerable to an\nXSS attack in the transformation feature. If a victim were to click on a\ncrafted link, an attacker could run malicious JavaScript on the victim's\nsystem. This issue only affected Ubuntu 20.04 ESM. (CVE-2020-26934)\n\nAndre Sá discovered that phpMyAdmin incorrectly handled certain SQL\nstatements in the search feature. A remote, authenticated attacker could\nuse this to inject malicious SQL into a query. This issue only affected\nUbuntu 20.04 ESM. (CVE-2020-26935)\n","modified":"2026-02-10T04:42:06Z","published":"2021-03-16T14:27:57Z","related":["UBUNTU-CVE-2014-9218","UBUNTU-CVE-2016-6609","UBUNTU-CVE-2016-6619","UBUNTU-CVE-2016-6630","UBUNTU-CVE-2016-9849","UBUNTU-CVE-2016-9866","UBUNTU-CVE-2017-1000014","UBUNTU-CVE-2017-1000015","UBUNTU-CVE-2017-18264","UBUNTU-CVE-2018-12581","UBUNTU-CVE-2018-19968","UBUNTU-CVE-2018-19970","UBUNTU-CVE-2018-7260","UBUNTU-CVE-2019-11768","UBUNTU-CVE-2019-12616","UBUNTU-CVE-2019-12922","UBUNTU-CVE-2019-19617","UBUNTU-CVE-2019-6798","UBUNTU-CVE-2020-26934","UBUNTU-CVE-2020-26935","UBUNTU-CVE-2020-5504"],"upstream":["CVE-2014-9218","CVE-2016-6609","CVE-2016-6619","CVE-2016-6630","CVE-2016-9849","CVE-2016-9866","CVE-2017-1000014","CVE-2017-1000015","CVE-2017-18264","CVE-2018-12581","CVE-2018-19968","CVE-2018-19970","CVE-2018-7260","CVE-2019-11768","CVE-2019-12616","CVE-2019-12922","CVE-2019-19617","CVE-2019-6798","CVE-2020-26934","CVE-2020-26935","CVE-2020-5504","UBUNTU-CVE-2014-9218","UBUNTU-CVE-2016-6609","UBUNTU-CVE-2016-6619","UBUNTU-CVE-2016-6630","UBUNTU-CVE-2016-9849","UBUNTU-CVE-2016-9866","UBUNTU-CVE-2017-1000014","UBUNTU-CVE-2017-1000015","UBUNTU-CVE-2017-18264","UBUNTU-CVE-2018-12581","UBUNTU-CVE-2018-19968","UBUNTU-CVE-2018-19970","UBUNTU-CVE-2018-7260","UBUNTU-CVE-2019-11768","UBUNTU-CVE-2019-12616","UBUNTU-CVE-2019-12922","UBUNTU-CVE-2019-19617","UBUNTU-CVE-2019-6798","UBUNTU-CVE-2020-26934","UBUNTU-CVE-2020-26935","UBUNTU-CVE-2020-5504"],"references":[{"type":"ADVISORY","url":"https://ubuntu.com/security/notices/USN-4843-1"},{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2014-9218"},{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2016-6609"},{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2016-6619"},{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2016-6630"},{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2016-9849"},{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2016-9866"},{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2017-18264"},{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2017-1000014"},{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2017-1000015"},{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2018-7260"},{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2018-12581"},{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2018-19968"},{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2018-19970"},{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2019-6798"},{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2019-11768"},{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2019-12616"},{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2019-12922"},{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2019-19617"},{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2020-5504"},{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2020-26934"},{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2020-26935"}],"affected":[{"package":{"name":"phpmyadmin","ecosystem":"Ubuntu:Pro:14.04:LTS","purl":"pkg:deb/ubuntu/phpmyadmin@4:4.0.10-1ubuntu0.1+esm4?arch=source&distro=trusty/esm"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"4:4.0.10-1ubuntu0.1+esm4"}]}],"versions":["4:4.0.6-1","4:4.0.8-1","4:4.0.9-1","4:4.0.10-1","4:4.0.10-1ubuntu0.1","4:4.0.10-1ubuntu0.1+esm1","4:4.0.10-1ubuntu0.1+esm2","4:4.0.10-1ubuntu0.1+esm3"],"ecosystem_specific":{"binaries":[{"binary_version":"4:4.0.10-1ubuntu0.1+esm4","binary_name":"phpmyadmin"}],"availability":"Available with Ubuntu Pro (Infra-only): https://ubuntu.com/pro"},"database_specific":{"source":"https://github.com/canonical/ubuntu-security-notices/blob/main/osv/usn/USN-4843-1.json","cves_map":{"cves":[{"severity":[{"score":"medium","type":"Ubuntu"}],"id":"CVE-2014-9218"},{"severity":[{"score":"CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H","type":"CVSS_V3"},{"score":"medium","type":"Ubuntu"}],"id":"CVE-2017-18264"},{"severity":[{"score":"CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H","type":"CVSS_V3"},{"score":"medium","type":"Ubuntu"}],"id":"CVE-2017-1000014"},{"severity":[{"score":"CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N","type":"CVSS_V3"},{"score":"medium","type":"Ubuntu"}],"id":"CVE-2017-1000015"},{"severity":[{"score":"CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N","type":"CVSS_V3"},{"score":"medium","type":"Ubuntu"}],"id":"CVE-2018-19968"}],"ecosystem":"Ubuntu:Pro:14.04:LTS"}}},{"package":{"name":"phpmyadmin","ecosystem":"Ubuntu:Pro:16.04:LTS","purl":"pkg:deb/ubuntu/phpmyadmin@4:4.5.4.1-2ubuntu2.1+esm6?arch=source&distro=esm-apps/xenial"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"4:4.5.4.1-2ubuntu2.1+esm6"}]}],"versions":["4:4.4.13.1-1","4:4.5.0.2-2","4:4.5.1-1","4:4.5.1-2","4:4.5.1-3","4:4.5.2-1","4:4.5.2-2","4:4.5.3.1-1","4:4.5.4-1","4:4.5.4.1-2","4:4.5.4.1-2ubuntu1","4:4.5.4.1-2ubuntu2","4:4.5.4.1-2ubuntu2.1","4:4.5.4.1-2ubuntu2.1+esm2","4:4.5.4.1-2ubuntu2.1+esm3","4:4.5.4.1-2ubuntu2.1+esm4","4:4.5.4.1-2ubuntu2.1+esm5"],"ecosystem_specific":{"binaries":[{"binary_version":"4:4.5.4.1-2ubuntu2.1+esm6","binary_name":"phpmyadmin"}],"availability":"Available with Ubuntu Pro: https://ubuntu.com/pro"},"database_specific":{"source":"https://github.com/canonical/ubuntu-security-notices/blob/main/osv/usn/USN-4843-1.json","cves_map":{"cves":[{"severity":[{"score":"CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H","type":"CVSS_V3"},{"score":"medium","type":"Ubuntu"}],"id":"CVE-2017-1000014"},{"severity":[{"score":"CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N","type":"CVSS_V3"},{"score":"medium","type":"Ubuntu"}],"id":"CVE-2017-1000015"},{"severity":[{"score":"CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N","type":"CVSS_V3"},{"score":"medium","type":"Ubuntu"}],"id":"CVE-2018-19968"},{"severity":[{"score":"CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H","type":"CVSS_V3"},{"score":"medium","type":"Ubuntu"}],"id":"CVE-2020-5504"}],"ecosystem":"Ubuntu:Pro:16.04:LTS"}}},{"package":{"name":"phpmyadmin","ecosystem":"Ubuntu:Pro:18.04:LTS","purl":"pkg:deb/ubuntu/phpmyadmin@4:4.6.6-5ubuntu0.5+esm1?arch=source&distro=esm-apps/bionic"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"4:4.6.6-5ubuntu0.5+esm1"}]}],"versions":["4:4.6.6-5","4:4.6.6-5ubuntu0.2+esm1","4:4.6.6-5ubuntu0.2+esm2","4:4.6.6-5ubuntu0.5"],"ecosystem_specific":{"binaries":[{"binary_version":"4:4.6.6-5ubuntu0.5+esm1","binary_name":"phpmyadmin"}],"availability":"Available with Ubuntu Pro: https://ubuntu.com/pro"},"database_specific":{"source":"https://github.com/canonical/ubuntu-security-notices/blob/main/osv/usn/USN-4843-1.json","cves_map":{"cves":[{"severity":[{"score":"CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N","type":"CVSS_V3"},{"score":"medium","type":"Ubuntu"}],"id":"CVE-2018-12581"},{"severity":[{"score":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N","type":"CVSS_V3"},{"score":"medium","type":"Ubuntu"}],"id":"CVE-2019-12922"}],"ecosystem":"Ubuntu:Pro:18.04:LTS"}}},{"package":{"name":"phpmyadmin","ecosystem":"Ubuntu:Pro:20.04:LTS","purl":"pkg:deb/ubuntu/phpmyadmin@4:4.9.5+dfsg1-2ubuntu0.1~esm1?arch=source&distro=esm-apps/focal"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"4:4.9.5+dfsg1-2ubuntu0.1~esm1"}]}],"versions":["4:4.9.1+dfsg1-2","4:4.9.2+dfsg1-1","4:4.9.5+dfsg1-1ubuntu1","4:4.9.5+dfsg1-2"],"ecosystem_specific":{"binaries":[{"binary_version":"4:4.9.5+dfsg1-2ubuntu0.1~esm1","binary_name":"phpmyadmin"}],"availability":"Available with Ubuntu Pro: https://ubuntu.com/pro"},"database_specific":{"source":"https://github.com/canonical/ubuntu-security-notices/blob/main/osv/usn/USN-4843-1.json","cves_map":{"cves":[{"severity":[{"score":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N","type":"CVSS_V3"},{"score":"medium","type":"Ubuntu"}],"id":"CVE-2020-26934"},{"severity":[{"score":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H","type":"CVSS_V3"},{"score":"medium","type":"Ubuntu"}],"id":"CVE-2020-26935"}],"ecosystem":"Ubuntu:Pro:20.04:LTS"}}}],"schema_version":"1.7.3"}