Vulnerability Description
Adminer through 4.3.1 has SSRF via the server parameter.
CVSS Score
9.8
CRITICAL
CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Adminer | Adminer | <= 4.3.1 |
Related Weaknesses (CWE)
References
- http://hyp3rlinx.altervista.org/advisories/ADMINER-UNAUTHENTICATED-SERVER-SIDE-RExploitThird Party Advisory
- https://lists.debian.org/debian-lts-announce/2018/03/msg00014.htmlThird Party Advisory
- http://hyp3rlinx.altervista.org/advisories/ADMINER-UNAUTHENTICATED-SERVER-SIDE-RExploitThird Party Advisory
- https://lists.debian.org/debian-lts-announce/2018/03/msg00014.htmlThird Party Advisory
FAQ
What is CVE-2018-7667?
CVE-2018-7667 is a vulnerability with a CVSS score of 9.8 (CRITICAL). Adminer through 4.3.1 has SSRF via the server parameter.
How severe is CVE-2018-7667?
CVE-2018-7667 has been rated CRITICAL with a CVSS base score of 9.8/10. This is considered a critical vulnerability requiring immediate attention.
Is there a patch for CVE-2018-7667?
Check the references section above for vendor advisories and patch information. Affected products include: Adminer Adminer.