{"id":"BIT-phpmyadmin-2020-10803","details":"In phpMyAdmin 4.x before 4.9.5 and 5.x before 5.0.2, a SQL injection vulnerability was discovered where malicious code could be used to trigger an XSS attack through retrieving and displaying results (in tbl_get_field.php and libraries/classes/Display/Results.php). The attacker must be able to insert crafted data into certain database tables, which when retrieved (for instance, through the Browse tab) can trigger the XSS attack.","aliases":["CVE-2020-10803","GHSA-fcww-8wvc-38q9"],"modified":"2025-04-03T14:40:37.652Z","published":"2024-03-06T11:03:18.382Z","database_specific":{"cpes":["cpe:2.3:a:phpmyadmin:phpmyadmin:*:*:*:*:*:*:*:*"],"severity":"Medium"},"references":[{"type":"WEB","url":"http://lists.opensuse.org/opensuse-security-announce/2020-03/msg00046.html"},{"type":"WEB","url":"http://lists.opensuse.org/opensuse-security-announce/2020-03/msg00050.html"},{"type":"WEB","url":"http://lists.opensuse.org/opensuse-security-announce/2020-11/msg00005.html"},{"type":"WEB","url":"https://lists.debian.org/debian-lts-announce/2020/03/msg00028.html"},{"type":"WEB","url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/AAVW3SUKWR5RF5LZ6SARCYOWBIFUIWOJ/"},{"type":"WEB","url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/BUG3IRITW2LUBGR5LSQMP7MVRTELHZJK/"},{"type":"WEB","url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/UZI6EQVRRIG252DY3MBT33BJVCSYDMQO/"},{"type":"WEB","url":"https://www.phpmyadmin.net/security/PMASA-2020-4/"},{"type":"WEB","url":"https://nvd.nist.gov/vuln/detail/CVE-2020-10803"}],"affected":[{"package":{"name":"phpmyadmin","ecosystem":"Bitnami","purl":"pkg:bitnami/phpmyadmin"},"ranges":[{"type":"SEMVER","events":[{"introduced":"4.0.0"},{"fixed":"4.9.5"},{"introduced":"5.0.0"},{"fixed":"5.0.2"}]}],"database_specific":{"source":"https://github.com/bitnami/vulndb/tree/main/data/phpmyadmin/BIT-phpmyadmin-2020-10803.json"},"severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N"}]}],"schema_version":"1.7.3"}