PMASA-2016-43

Announcement-ID: PMASA-2016-43

Date: 2016-07-15

Summary

Unvalidated data passed to unserialize()

Description

A vulnerability was reported where some data is passed to the PHP unserialize() function without verification that it's valid serialized data.

Due to how the PHP function operates,

Unserialization can result in code being loaded and executed due to object instantiation and autoloading, and a malicious user may be able to exploit this.

Therefore, a malicious user may be able to manipulate the stored data in a way to exploit this weakness.

Severity

We consider this vulnerability to be moderately severe.

Affected Versions

All 4.6.x versions (prior to 4.6.4), 4.4.x versions (prior to 4.4.15.8), and 4.0.x versions (prior to 4.0.10.17) are affected

Solution

Upgrade to phpMyAdmin 4.6.4, 4.4.15.8, or 4.0.10.17 or newer or apply patch listed below.

References

Thanks to Emanuel Bronshtein @e3amn2l for reporting this vulnerability.

Assigned CVE ids: CVE-2016-6620

CWE ids: CWE-661

Patches

The following commits have been made on the 4.0 branch to fix this issue:

The following commits have been made on the 4.4 branch to fix this issue:

The following commits have been made on the 4.6 branch to fix this issue:

More information

For further information and in case of questions, please contact the phpMyAdmin team. Our website is phpmyadmin.net.

Announcements