diff --git a/cves/2019/CVE-2019-6799.yaml b/cves/2019/CVE-2019-6799.yaml index 49aaa8f2b1..9566551ba2 100644 --- a/cves/2019/CVE-2019-6799.yaml +++ b/cves/2019/CVE-2019-6799.yaml @@ -4,7 +4,8 @@ info: name: CVE-2019-6799 author: pwnhxl severity: high - description: An issue was discovered in phpMyAdmin before 4.8.5. When the AllowArbitraryServer configuration setting is set to true, with the use of a rogue MySQL server, an attacker can read any file on the server that the web server's user can access. This is related to the mysql.allow_local_infile PHP configuration, and the inadvertent ignoring of "options(MYSQLI_OPT_LOCAL_INFILE" calls. + description: | + An issue was discovered in phpMyAdmin before 4.8.5. When the AllowArbitraryServer configuration setting is set to true, with the use of a rogue MySQL server, an attacker can read any file on the server that the web server's user can access. This is related to the mysql.allow_local_infile PHP configuration, and the inadvertent ignoring of "options(MYSQLI_OPT_LOCAL_INFILE" calls. reference: - https://paper.seebug.org/1112/#_4 - https://github.com/phpmyadmin/phpmyadmin/commit/828f740158e7bf14aa4a7473c5968d06364e03a2 @@ -17,7 +18,7 @@ info: shodan-query: title:"phpmyadmin" hunter-query: app.name="phpMyAdmin"&&web.body="pma_servername"&&web.body="4.8.4" fofa-query: body="pma_servername" && body="4.8.4" - tags: phpmyadmin,mysql,fileread + tags: cve,cve2019,phpmyadmin,mysql,fileread requests: - raw: