CVE-2016-6614
high-risk
Published 2016-12-11
An issue was discovered in phpMyAdmin involving the %u username replacement functionality of the SaveDir and UploadDir features. When the username substitution is configured, a specially-crafted user name can be used to circumvent restrictions to traverse the file system. All 4.6.x versions (prior to 4.6.4), 4.4.x versions (prior to 4.4.15.8), and 4.0.x versions (prior to 4.0.10.17) are affected.
Do I need to act?
~
1.1% chance of exploitation in next 30 days
EPSS score — moderate exploit probability
-
Not on CISA KEV list
No confirmed active exploitation reported to CISA
?
Patch status unknown
Check vendor advisories for fix availability and mitigation guidance
6
CVSS 6.8/10
Medium
NETWORK
/ HIGH complexity
Affected Products (20)
Affected Vendors
References (8)
Third Party Advisory
http://www.securityfocus.com/bid/94366
Third Party Advisory
http://www.securityfocus.com/bid/94366
51
/ 100
high-risk
Severity
21/34 · High
Exploitability
3/34 · Minimal
Exposure
27/34 · High