|
|
Subscribe / Log in / New account

Mageia alert MGASA-2020-0383 (phpmyadmin)

From:  Mageia Updates <buildsystem-daemon@mageia.org>
To:  updates-announce@ml.mageia.org
Subject:  [updates-announce] MGASA-2020-0383: Updated phpmyadmin packages fix security vulnerabilities
Date:  Fri, 16 Oct 2020 17:46:06 +0200
Message-ID:  <20201016154606.52A799F6EB@duvel.mageia.org>
Archive-link:  Article

MGASA-2020-0383 - Updated phpmyadmin packages fix security vulnerabilities Publication date: 16 Oct 2020 URL: https://advisories.mageia.org/MGASA-2020-0383.html Type: security Affected Mageia releases: 7 CVE: CVE-2020-26934, CVE-2020-26935 Description: A vulnerability was discovered where an attacker can cause an XSS attack through the transformation feature. If an attacker sends a crafted link to the victim with the malicious JavaScript, when the victim clicks on the link, the JavaScript will run and complete the instructions made by the attacker. (CVE-2020-26934) An SQL injection vulnerability was discovered in how phpMyAdmin processes SQL statements in the search feature. An attacker could use this flaw to inject malicious SQL in to a query. (CVE-2020-26935) References: - https://bugs.mageia.org/show_bug.cgi?id=27379 - https://www.phpmyadmin.net/news/2020/10/10/phpmyadmin-496... - https://www.phpmyadmin.net/security/PMASA-2020-5/ - https://www.phpmyadmin.net/security/PMASA-2020-6/ - https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-2... - https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-2... SRPMS: - 7/core/phpmyadmin-4.9.6-1.mga7


to post comments


Copyright © 2025, Eklektix, Inc.
Comments and public postings are copyrighted by their creators.
Linux is a registered trademark of Linus Torvalds