Ecosyste.ms: Advisories
An open API service providing security vulnerability metadata for many open source software ecosystems.
Security Advisories: GSA_kwCzR0hTQS0ydjgyLTU3NDYtdndxY800Ew
XSS in doc_link
Impact
Users of MySQL, MariaDB, PgSQL and SQLite are affected. XSS is in most cases prevented by strict CSP in all modern browsers. The only exception is when Adminer is using a pdo_
extension to communicate with the database (it is used if the native extensions are not enabled). In browsers without CSP, Adminer versions 4.6.1 to 4.8.0 are affected.
Patches
Patched by 4043092, included in version 4.8.1.
Workarounds
Do both:
- Use browser supporting strict CSP.
- Enable the native PHP extensions (e.g.
mysqli
) or disable displaying PHP errors (display_errors
).
References
https://sourceforge.net/p/adminer/bugs-and-features/797/
For more information
If you have any questions or comments about this advisory:
- Comment at 4043092.
JSON: https://advisories.ecosyste.ms/api/v1/advisories/GSA_kwCzR0hTQS0ydjgyLTU3NDYtdndxY800Ew
Source: GitHub Advisory Database
Origin: Unspecified
Severity: High
Classification: General
Published: almost 3 years ago
Updated: almost 2 years ago
CVSS Score: 7.5
CVSS vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H
EPSS Percentage: 0.0045
EPSS Percentile: 0.74803
Identifiers: GHSA-2v82-5746-vwqc, CVE-2021-29625
References:
- https://github.com/vrana/adminer/security/advisories/GHSA-2v82-5746-vwqc
- https://nvd.nist.gov/vuln/detail/CVE-2021-29625
- https://github.com/vrana/adminer/commit/4043092ec2c0de2258d60a99d0c5958637d051a7
- https://packagist.org/packages/vrana/adminer
- https://sourceforge.net/p/adminer/bugs-and-features/797/
- https://github.com/advisories/GHSA-2v82-5746-vwqc
Blast Radius: 14.8
Affected Packages
packagist:vrana/adminer
Dependent packages: 14Dependent repositories: 94
Downloads: 2,664,515 total
Affected Version Ranges: >= 4.7.8, < 4.8.1
Fixed in: 4.8.1
All affected versions: 4.7.8, 4.7.9, 4.8.0
All unaffected versions: 4.2.0, 4.2.1, 4.2.2, 4.2.3, 4.2.4, 4.2.5, 4.3.0, 4.3.1, 4.4.0, 4.5.0, 4.6.0, 4.6.1, 4.6.2, 4.6.3, 4.7.0, 4.7.1, 4.7.2, 4.7.3, 4.7.4, 4.7.5, 4.7.6, 4.7.7, 4.8.1