ALPINE-CVE-2016-6631

Source
https://security.alpinelinux.org/vuln/CVE-2016-6631
Import Source
https://storage.googleapis.com/osv-test-cve-osv-conversion/alpine/ALPINE-CVE-2016-6631.json
JSON Data
https://api.test.osv.dev/v1/vulns/ALPINE-CVE-2016-6631
Upstream
Published
2016-12-11T02:59:40Z
Modified
2025-09-25T23:52:02.696391Z
Severity
  • 7.5 (High) CVSS_V3 - CVSS:3.0/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H CVSS Calculator
Summary
[none]
Details

An issue was discovered in phpMyAdmin. A user can execute a remote code execution attack against a server when phpMyAdmin is being run as a CGI application. Under certain server configurations, a user can pass a query string which is executed as a command-line argument by the file generator_plugin.sh. All 4.6.x versions (prior to 4.6.4), 4.4.x versions (prior to 4.4.15.8), and 4.0.x versions (prior to 4.0.10.17) are affected.

References

Affected packages

Alpine:v3.2 / phpmyadmin

Package

Name
phpmyadmin
Purl
pkg:apk/alpine/phpmyadmin?arch=source

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
4.4.15.8-r0

Affected versions

3.*

3.3.10-r0
3.3.10-r1
3.3.10-r2
3.4.9-r0
3.4.11.1-r0

4.*

4.0.0-r0
4.0.1-r0
4.0.2-r0
4.0.3-r0
4.0.4.1-r0
4.0.4.2-r0
4.0.5-r0
4.0.6-r0
4.0.7-r0
4.0.8-r0
4.0.8-r1
4.0.8-r2
4.0.9-r0
4.0.10-r0
4.1.4-r0
4.1.5-r0
4.1.6-r0
4.1.7-r0
4.1.8-r0
4.1.9-r0
4.1.11-r0
4.1.12-r0
4.1.13-r0
4.1.14-r0
4.2.0-r0
4.2.1-r0
4.2.2-r0
4.2.3-r0
4.2.4-r0
4.2.5-r0
4.2.6-r0
4.2.7-r0
4.2.7.1-r0
4.2.8-r0
4.2.8.1-r0
4.2.9-r0
4.2.9.1-r0
4.2.10-r0
4.2.10.1-r0
4.2.11-r0
4.2.12-r0
4.2.13.1-r0
4.3.0-r0
4.3.1-r0
4.3.3-r0
4.3.4-r0
4.3.5-r0
4.3.7-r0
4.3.8-r0
4.3.9-r0
4.3.10-r0
4.3.11.1-r0
4.3.12-r0
4.3.13-r0
4.4.1.1-r0
4.4.3-r0
4.4.4-r0
4.4.5-r0
4.4.7-r0
4.4.15-r0
4.4.15.1-r0
4.4.15.4-r0
4.4.15.7-r0