PhpMyAdmin Releases Security Update 4.8.5 Patches SQL Injection and Arbitrary File Read

PhpMyAdmin security fix v4.8.5 will patch an SQL Injection and arbitrary file read vulnerability.

Security is a daily ongoing endeavor and discipline in today’s online world. In a security blog post the developers of phpMyAdmin announced version 4.8.5 of its software to address a few security related issues.

The security fixes involve:

  • Arbitrary file read vulnerability (https://www.phpmyadmin.net/security/PMASA-2019-1)
  • SQL injection in the Designer interface (https://www.phpmyadmin.net/security/PMASA-2019-2)

The arbitrary file read vulnerability could also be exploited to delete arbitrary files on the server. This attack requires that phpMyAdmin be run with the $cfg['AllowArbitraryServer'] directive set to true, which is not the default. An attacker must run a malicious server process that will masquerade as a MySQL server. This exploit has been found and fixed recently in several other related projects and appears to be caused by a bug in PHP (https://bugs.php.net/bug.php?id=77496).

In addition to the security fixes, this release also includes these bug fixes and more as part of our regular release cycle:

  • Export to SQL format not available
  • QR code not shown when adding two-factor authentication to a user account
  • Issue with adding a new user in MySQL 8.0.11 and newer
  • Frozen interface relating to Text_Plain_Sql plugin
  • Table level Operations tab was missing

And several more. Complete notes are in the ChangeLog file included with this release.

As always, downloads are available at https://www.phpmyadmin.net/downloads/

Update if you got it and as always, great work my the devs !