phpPgAdmin 7.14.4 and earlier is vulnerable to deserialization of untrusted data which may lead to remote code execution because user-controlled data is directly passed to the PHP unserialize() function in multiple places. An example is the functionality to manage tables in tables.php where the ma[] POST parameter is deserialized.
The product deserializes untrusted data without sufficiently ensuring that the resulting data will be valid.
Name | Vendor | Start Version | End Version |
---|---|---|---|
Phppgadmin | Phppgadmin_project | * | 7.14.4 (including) |
Phppgadmin | Ubuntu | bionic | * |
Phppgadmin | Ubuntu | focal | * |
Phppgadmin | Ubuntu | lunar | * |
Phppgadmin | Ubuntu | mantic | * |
Phppgadmin | Ubuntu | oracular | * |
Phppgadmin | Ubuntu | trusty | * |
Phppgadmin | Ubuntu | xenial | * |