ID CVE-2021-21311
Summary Adminer is an open-source database management in a single PHP file. In adminer from version 4.0.0 and before 4.7.9 there is a server-side request forgery vulnerability. Users of Adminer versions bundling all drivers (e.g. `adminer.php`) are affected. This is fixed in version 4.7.9.
References
Vulnerable Configurations
  • cpe:2.3:a:adminer:adminer:4.0.0:*:*:*:*:*:*:*
    cpe:2.3:a:adminer:adminer:4.0.0:*:*:*:*:*:*:*
  • cpe:2.3:a:adminer:adminer:4.0.1:*:*:*:*:*:*:*
    cpe:2.3:a:adminer:adminer:4.0.1:*:*:*:*:*:*:*
  • cpe:2.3:a:adminer:adminer:4.0.2:*:*:*:*:*:*:*
    cpe:2.3:a:adminer:adminer:4.0.2:*:*:*:*:*:*:*
  • cpe:2.3:a:adminer:adminer:4.0.3:*:*:*:*:*:*:*
    cpe:2.3:a:adminer:adminer:4.0.3:*:*:*:*:*:*:*
  • cpe:2.3:a:adminer:adminer:4.1.0:*:*:*:*:*:*:*
    cpe:2.3:a:adminer:adminer:4.1.0:*:*:*:*:*:*:*
  • cpe:2.3:a:adminer:adminer:4.2.0:*:*:*:*:*:*:*
    cpe:2.3:a:adminer:adminer:4.2.0:*:*:*:*:*:*:*
  • cpe:2.3:a:adminer:adminer:4.2.1:*:*:*:*:*:*:*
    cpe:2.3:a:adminer:adminer:4.2.1:*:*:*:*:*:*:*
  • cpe:2.3:a:adminer:adminer:4.2.2:*:*:*:*:*:*:*
    cpe:2.3:a:adminer:adminer:4.2.2:*:*:*:*:*:*:*
  • cpe:2.3:a:adminer:adminer:4.2.3:*:*:*:*:*:*:*
    cpe:2.3:a:adminer:adminer:4.2.3:*:*:*:*:*:*:*
  • cpe:2.3:a:adminer:adminer:4.2.4:*:*:*:*:*:*:*
    cpe:2.3:a:adminer:adminer:4.2.4:*:*:*:*:*:*:*
  • cpe:2.3:a:adminer:adminer:4.2.5:*:*:*:*:*:*:*
    cpe:2.3:a:adminer:adminer:4.2.5:*:*:*:*:*:*:*
  • cpe:2.3:a:adminer:adminer:4.3.0:*:*:*:*:*:*:*
    cpe:2.3:a:adminer:adminer:4.3.0:*:*:*:*:*:*:*
  • cpe:2.3:a:adminer:adminer:4.3.1:*:*:*:*:*:*:*
    cpe:2.3:a:adminer:adminer:4.3.1:*:*:*:*:*:*:*
  • cpe:2.3:a:adminer:adminer:4.4.0:*:*:*:*:*:*:*
    cpe:2.3:a:adminer:adminer:4.4.0:*:*:*:*:*:*:*
  • cpe:2.3:a:adminer:adminer:4.5.0:*:*:*:*:*:*:*
    cpe:2.3:a:adminer:adminer:4.5.0:*:*:*:*:*:*:*
  • cpe:2.3:a:adminer:adminer:4.6.0:*:*:*:*:*:*:*
    cpe:2.3:a:adminer:adminer:4.6.0:*:*:*:*:*:*:*
  • cpe:2.3:a:adminer:adminer:4.6.1:*:*:*:*:*:*:*
    cpe:2.3:a:adminer:adminer:4.6.1:*:*:*:*:*:*:*
  • cpe:2.3:a:adminer:adminer:4.6.2:*:*:*:*:*:*:*
    cpe:2.3:a:adminer:adminer:4.6.2:*:*:*:*:*:*:*
  • cpe:2.3:a:adminer:adminer:4.6.3:*:*:*:*:*:*:*
    cpe:2.3:a:adminer:adminer:4.6.3:*:*:*:*:*:*:*
  • cpe:2.3:a:adminer:adminer:4.7.0:*:*:*:*:*:*:*
    cpe:2.3:a:adminer:adminer:4.7.0:*:*:*:*:*:*:*
  • cpe:2.3:a:adminer:adminer:4.7.1:*:*:*:*:*:*:*
    cpe:2.3:a:adminer:adminer:4.7.1:*:*:*:*:*:*:*
  • cpe:2.3:a:adminer:adminer:4.7.2:*:*:*:*:*:*:*
    cpe:2.3:a:adminer:adminer:4.7.2:*:*:*:*:*:*:*
  • cpe:2.3:a:adminer:adminer:4.7.3:*:*:*:*:*:*:*
    cpe:2.3:a:adminer:adminer:4.7.3:*:*:*:*:*:*:*
  • cpe:2.3:a:adminer:adminer:4.7.4:*:*:*:*:*:*:*
    cpe:2.3:a:adminer:adminer:4.7.4:*:*:*:*:*:*:*
  • cpe:2.3:a:adminer:adminer:4.7.5:*:*:*:*:*:*:*
    cpe:2.3:a:adminer:adminer:4.7.5:*:*:*:*:*:*:*
  • cpe:2.3:a:adminer:adminer:4.7.6:*:*:*:*:*:*:*
    cpe:2.3:a:adminer:adminer:4.7.6:*:*:*:*:*:*:*
  • cpe:2.3:a:adminer:adminer:4.7.7:*:*:*:*:*:*:*
    cpe:2.3:a:adminer:adminer:4.7.7:*:*:*:*:*:*:*
  • cpe:2.3:a:adminer:adminer:4.7.8:*:*:*:*:*:*:*
    cpe:2.3:a:adminer:adminer:4.7.8:*:*:*:*:*:*:*
  • cpe:2.3:a:adminer:adminer:4.7.9:*:*:*:*:*:*:*
    cpe:2.3:a:adminer:adminer:4.7.9:*:*:*:*:*:*:*
  • cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*
    cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*
CVSS
Base: 6.4 (as of 24-06-2021 - 12:50)
Impact:
Exploitability:
CWE CWE-918
CAPEC
Access
VectorComplexityAuthentication
NETWORK LOW NONE
Impact
ConfidentialityIntegrityAvailability
PARTIAL PARTIAL NONE
cvss-vector via4 AV:N/AC:L/Au:N/C:P/I:P/A:N
Last major update 24-06-2021 - 12:50
Published 11-02-2021 - 21:15
Last modified 24-06-2021 - 12:50
Back to Top