CVE-2023-40619

NameCVE-2023-40619
DescriptionphpPgAdmin 7.14.4 and earlier is vulnerable to deserialization of untrusted data which may lead to remote code execution because user-controlled data is directly passed to the PHP 'unserialize()' function in multiple places. An example is the functionality to manage tables in 'tables.php' where the 'ma[]' POST parameter is deserialized.
SourceCVE (at NVD; CERT, LWN, oss-sec, fulldisc, Red Hat, Ubuntu, Gentoo, SUSE bugzilla/CVE, GitHub advisories/code/issues, web search, more)
ReferencesDLA-3644-1, ELA-1139-1
Debian Bugs1053004

Vulnerable and fixed packages

The table below lists information on source packages.

Source PackageReleaseVersionStatus
phppgadmin (PTS)jessie, jessie (lts)5.1-1.1+deb8u1fixed
stretch5.1+ds-2vulnerable
buster (security), buster, buster (lts)5.1+ds-4+deb10u1fixed
sid, trixie7.14.7+dfsg-1fixed

The information below is based on the following data on fixed versions.

PackageTypeReleaseFixed VersionUrgencyOriginDebian Bugs
phppgadminsourcejessie5.1-1.1+deb8u1ELA-1139-1
phppgadminsourcestretch(unfixed)end-of-life
phppgadminsourcebuster5.1+ds-4+deb10u1DLA-3644-1
phppgadminsource(unstable)7.14.7+dfsg-11053004

Notes

https://github.com/phppgadmin/phppgadmin/issues/174
https://github.com/hestiacp/phppgadmin/pull/4

Search for package or bug name: Reporting problems