CVE-2016-6614Path Traversal in Phpmyadmin

CWE-22Path Traversal4 documents4 sources
Severity
6.8MEDIUMNVD
EPSS
1.1%
top 21.84%
CISA KEV
Not in KEV
Exploit
No known exploits
Affected products
Timeline
PublishedDec 11
Latest updateMay 14

Description

An issue was discovered in phpMyAdmin involving the %u username replacement functionality of the SaveDir and UploadDir features. When the username substitution is configured, a specially-crafted user name can be used to circumvent restrictions to traverse the file system. All 4.6.x versions (prior to 4.6.4), 4.4.x versions (prior to 4.4.15.8), and 4.0.x versions (prior to 4.0.10.17) are affected.

CVSS vector

CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:C/C:H/I:N/A:NExploitability: 2.2 | Impact: 4.0

Affected Packages3 packages

debiandebian/phpmyadmin< phpmyadmin 4:4.6.4+dfsg1-1 (bookworm)
Debianphpmyadmin/phpmyadmin< 4:4.6.4+dfsg1-1+3
NVDphpmyadmin/phpmyadmin60 versions+59

Patches

🔴Vulnerability Details

2
GHSA
GHSA-97fm-cg55-639q: An issue was discovered in phpMyAdmin involving the %u username replacement functionality of the SaveDir and UploadDir features2022-05-14
OSV
CVE-2016-6614: An issue was discovered in phpMyAdmin involving the %u username replacement functionality of the SaveDir and UploadDir features2016-12-11

📋Vendor Advisories

1
Debian
CVE-2016-6614: phpmyadmin - An issue was discovered in phpMyAdmin involving the %u username replacement func...2016