CVE-2017-18264

Source
https://nvd.nist.gov/vuln/detail/CVE-2017-18264
Import Source
https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2017-18264.json
JSON Data
https://api.osv.dev/v1/vulns/CVE-2017-18264
Aliases
Related
Published
2018-05-01T17:29:00Z
Modified
2024-09-18T02:54:30.100164Z
Severity
  • 9.8 (Critical) CVSS_V3 - CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H CVSS Calculator
Summary
[none]
Details

An issue was discovered in libraries/common.inc.php in phpMyAdmin 4.0 before 4.0.10.20, 4.4.x, 4.6.x, and 4.7.0 prereleases. The restrictions caused by $cfg['Servers'][$i]['AllowNoPassword'] = false are bypassed under certain PHP versions (e.g., version 5). This can allow the login of users who have no password set even if the administrator has set $cfg['Servers'][$i]['AllowNoPassword'] to false (which is also the default). This occurs because some implementations of the PHP substr function return false when given '' as the first argument.

References

Affected packages

Debian:11 / phpmyadmin

Package

Name
phpmyadmin
Purl
pkg:deb/debian/phpmyadmin?arch=source

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
4:4.6.6-2

Ecosystem specific

{
    "urgency": "not yet assigned"
}

Debian:12 / phpmyadmin

Package

Name
phpmyadmin
Purl
pkg:deb/debian/phpmyadmin?arch=source

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
4:4.6.6-2

Ecosystem specific

{
    "urgency": "not yet assigned"
}

Debian:13 / phpmyadmin

Package

Name
phpmyadmin
Purl
pkg:deb/debian/phpmyadmin?arch=source

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
4:4.6.6-2

Ecosystem specific

{
    "urgency": "not yet assigned"
}

Git / github.com/phpmyadmin/phpmyadmin

Affected ranges

Type
GIT
Repo
https://github.com/phpmyadmin/phpmyadmin
Events

Affected versions

Other

RELEASE_4_0_0
RELEASE_4_0_10
RELEASE_4_0_10_1
RELEASE_4_0_10_10
RELEASE_4_0_10_11
RELEASE_4_0_10_12
RELEASE_4_0_10_13
RELEASE_4_0_10_15
RELEASE_4_0_10_16
RELEASE_4_0_10_17
RELEASE_4_0_10_18
RELEASE_4_0_10_19
RELEASE_4_0_10_2
RELEASE_4_0_10_3
RELEASE_4_0_10_4
RELEASE_4_0_10_5
RELEASE_4_0_10_6
RELEASE_4_0_10_7
RELEASE_4_0_10_8
RELEASE_4_0_10_9
RELEASE_4_0_1RC1
RELEASE_4_0_2
RELEASE_4_0_2RC1
RELEASE_4_0_3
RELEASE_4_0_3RC1
RELEASE_4_0_4
RELEASE_4_0_4RC1
RELEASE_4_0_4_1
RELEASE_4_0_4_2
RELEASE_4_0_5RC1
RELEASE_4_0_6
RELEASE_4_0_6RC1
RELEASE_4_0_6RC2