The phpMyAdmin team is pleased to announce the release of phpMyAdmin version 4.8.2. Among other bug fixes, this contains an important security update and it is highly recommended that all users upgrade immediately.
The urgent vulnerability allows an authenticated attacker to exploit a phpMyAdmin feature to show and potentially execute files on the server. PHP open_basedir restrictions mitigate the effect of this flaw. For further details, see the PMASA announcement .
A second flaw was also fixed allowing an attacker to use a specially crafted database name to trick a user in to executing a cross-site scripting (XSS) attack in the Designer feature .
In addition to the security fixes, this release also includes these bug fixes as part of our regular release cycle:
sudo dnf upgrade --advisory=FEDORA-2018-68349e3094
|submitted||10 months ago|
|in testing||10 months ago|
|in stable||9 months ago|
|modified||10 months ago|
|0||0||#1594407 CVE-2018-12581 phpMyAdmin: XSS when the database is referenced from the Designer feature|
|0||0||#1594416 CVE-2018-12581 phpMyAdmin: XSS when the database is referenced from the Designer feature [fedora-all]|