Author Topic: Update obsolete phpMyAdmin v4.7.9 to latest phpMyAdmin v5.0.1 for CWP & CWP PRO!  (Read 2256 times)

0 Members and 2 Guests are viewing this topic.

Offline
**
Hi,

First of all i wish to congratulate all the programmers of both CWP (Centos Web Panel) and CWP (Centos Web Panel) PRO for the excellent work they do and for the excellent product they have created, truly excellent from all points of view.
Congratulations also for the new and beautiful official website of CWP and CWP PRO https://control-webpanel.com/

Having said that, i ask you to consider from your next CWP (Centos Web Panel) and CWP (Centos Web Panel) PRO release,
updating phpMyAdmin to the latest version of phpMyAdmin v5.0.1 which was released on 08 January, 2020.

If you use this command sh /scripts/mysql_phpmyadmin_update the result is that an obsolete version of phpMyAdmin is installed for CWP (Centos Web Panel) and CWP (Centos Web Panel) PRO which is phpMyAdmin v4.7.9 which was released on 05 March, 2018.

NOTE FROM PHPMYADMIN DEVELOPER:

This is a reminder that phpMyAdmin 4.9.3 is in the long-term support phase where it will only get important security fixes and critical bug fixes. Users are suggested to migrate to version 5.0.


This is the official changelog link for phpMyAdmin v5.0.1: https://www.phpmyadmin.net/files/5.0.1/

Welcome to the release of phpMyAdmin version 5.0.1. This is fixes an important security flaw as well as containing several other bug fixes.

The two most notable fixes:
* Issue #15724 regarding two-factor authentication
* PMASA-2020-1 which is an SQL injection vulnerability in the user accounts page

There are several other bugs fixes, please see the ChangeLog file included with this release for full details.

Known shortcomings:

Due to changes in the MySQL authentication method, PHP versions prior to 7.4 are unable to authenticate to a MySQL 8.0 or newer server (our tests show the problem actually began with MySQL 8.0.11). This relates to a PHP bug https://bugs.php.net/bug.php?id=76243. There is a workaround, that is to set your user account to use the current-style password hash method, mysql_native_password. This unfortunate lack of coordination has caused the incompatibility to affect all PHP applications, not just phpMyAdmin. For more details, you can see our bug tracker item at https://github.com/phpmyadmin/phpmyadmin/issues/14220. We suggest upgrading your PHP installation to take advantage of the authentication methods.

Downloads are available now at https://phpmyadmin.net/downloads/

For the phpMyAdmin team,
Isaac

This is the official changelog link for phpMyAdmin v5.0.0: https://www.phpmyadmin.net/files/5.0.0/

Welcome to the release of phpMyAdmin version 5.0.0.

This release includes many new features and improvements from the 4.9 series. We expect to maintain version 4 in a security capacity
to support users with older PHP installations. For full details about supported versions and end of life dates, see the "Supported versions"
grid at .

With this release, we are removing support of old PHP versions (5.5, 5.6, 7.0, and HHVM). These versions are outdated and are no longer supported by the PHP team.

Version 5.0 includes many coding improvements that modernize the interface. Many of these changes are transparent to users, but make the code easier to maintain.
Much of this refactoring work is completed by our contract developer, Maurício Meneghini Fauth. We always consider applications for new (paid) contract developers,
see  for program details.

Some of the changes and new features include:

- Enable columns names by default for CSV exports
- Add Metro theme
- Automatically add the index when creating an auto increment column
- Improvements to exporting views
- Prompt the user for confirmation before running an UPDATE query with no WHERE clause
- Improvements to how errors are show to the user (including allowing easier copying of the error text to the clipboard)
- Added keystrokes to clear the line (ctrl+l) and clear the entire console window (ctrl+u)
- Use charset 'windows-1252' when export format is MS Excel

There are several more changes, please refer to the ChangeLog file included with the release for full details.

Known shortcomings:

Due to changes in the MySQL authentication method, PHP versions prior to 7.4 are unable to authenticate to a MySQL 8.0 or newer server (our tests show the problem actually began with MySQL 8.0.11). This relates to a PHP bug https://bugs.php.net/bug.php?id=76243. There is a workaround, that is to set your user account to use the current-style password hash method, mysql_native_password. This unfortunate lack of coordination has caused the incompatibility to affect all PHP applications, not just phpMyAdmin. For more details, you can see our bug tracker item at https://github.com/phpmyadmin/phpmyadmin/issues/14220. We suggest upgrading your PHP installation to take advantage of the authentication methods.

Downloads are available now at https://phpmyadmin.net/downloads/

Our work would not be possible without the donations of our generous sponsor, and this release in particular is brought to you thanks to the hard work of our Google Summer of Code students and many other contributors.

For the phpMyAdmin team,
Isaac

This is the official changelog link for phpMyAdmin v4.9.4: https://www.phpmyadmin.net/files/4.9.4/

Welcome to the release of phpMyAdmin version 4.9.4. This is a security release and also contains a fix for a problem with two-factor authentication
that was introduced in version 4.9.3.

Changes this version:
- Issue #15724 regarding two-factor authentication
- PMASA-2020-1 which is an SQL injection vulnerability in the user accounts page

This is a reminder that phpMyAdmin 4.9.3 is in the long-term support phase where it will only get important security fixes and critical bug fixes. Users are suggested to migrate to version 5.0.

Downloads are available now at https://phpmyadmin.net/downloads/

For the phpMyAdmin team,
Isaac

This is the official changelog link for phpMyAdmin v4.9.3: https://www.phpmyadmin.net/files/4.9.3/

Welcome to phpMyAdmin 4.9.3, a routine bugfix release.

This is planned as the final bugfix release of phpMyAdmin version 4. Version 4 works with PHP versions 5.5 through (at least) 7.4,
and MySQL versions 5.5 and newer (and the corresponding MariaDB versions). Version 5 will require PHP 7.1 or newer, but
we plan to maintain security fixes for version 4 as part of our LTS program. For end of life details and supported
versions, please see the "Supported versions" grid at .

This release includes fixes for many bugs, including:

- Several PHP notices and warnings including "Undefined index table_create_time,"
  a notice about error_reporting() being disabled for security reasons, and several Undefined Index errors.
- Support CloudFront-Forwarded-Proto header for Amazon CloudFront proxy
- Early compatibility with development versions of PHP 8
- Fix replication actions (start, stop, etc)

There are many, many more bug fixes thanks to the efforts of our developers and other contributors.
For full details, you can see the ChangeLog file included with this release.

The phpMyAdmin team

This is the official changelog link for phpMyAdmin v4.9.2: https://www.phpmyadmin.net/files/4.9.2/

Welcome to phpMyAdmin 4.9.2, a bugfix release that also contains a security fix.

This security fix is part of an ongoing effort to improve the security of the Designer feature.
There is also an improvement for how we sanitize Git version information shown on the home page, thanks to Ali Hubail.

This release includes fixes for many bugs, including:

- Fixes for the "Failed to set session cookie" error which relates to the cookie name. In some cases, data stored in the cookie (such as the previously-used user account) may not be loaded from a previous phpMyAdmin cookie the first time you run version 4.9.2
- Fix for Advisor with MySQL 8.0.3 and newer
- Fix PHP deprecation errors
- Fix a situation where exporting users after a delete query could remove users
- Fix incorrect "You do not have privileges to manipulate with the users!" warning
- Fix copying a database's privileges and several other problems moving columns with MariaDB
- Fix for phpMyAdmin not selecting all the values when using shift-click to select during Export

There are many, many more bug fixes thanks to the efforts of our developers and other contributors.

The phpMyAdmin team

This is the official changelog link for phpMyAdmin v4.9.1: https://www.phpmyadmin.net/files/4.9.1/

Welcome to phpMyAdmin 4.9.1, a bugfix release.

This is a regularly-schedule bugfix release that also includes some security hardening measures.

We wish to point out that this also includes a routine fix for an issue that has been reported as CVE-2019-12922. The fix for this has been in our release queue to be part of this release, however it is the opinion of the team that the reported attack vector did not justify a separate release.

This release includes fixes for many bugs, including:

- Editing columns with CURRENT_TIMESTAMP for MySQL versions 8.0.13 and newer
- Compatibility issues with PHP 8
- Export of GIS visualization
- Enhanced descriptions for several collation types
- Creating a user with a single quote in the password string
- Unexpected quotes during import and export on text fields
- Improvements to adding new tables to Designer
- Fix an issue where an authenticated user could trigger heavy traffic between the database server and web server
- Fix a weakness where an attacker, under certain conditions, working at the same time as an administrator is using the setup script, could delete a server from the setup script

There are many, many more bug fixes thanks to the efforts of our developers, Google Summer of Code applicants, and other contributors.

The phpMyAdmin team

This is the official changelog link for phpMyAdmin v4.9.0.1: https://www.phpmyadmin.net/files/4.9.0.1/

Welcome to phpMyAdmin 4.9.0.1, a bugfix release that includes important security fixes.

This release fixes two security vulnerabilities:

* PMASA-2019-3 is an SQL injection flaw in the Designer feature
* PMASA-2019-4 is a CSRF attack that's possible through the 'cookie' login form

Upgrading is highly recommended for all users. Using the 'http' auth_type instead of 'cookie' can mitigate the CSRF attack.

The solution for the CSRF attack does remove the former functionality to log in directly through URL parameters (as mentioned in FAQ 4.8, such as https://example.com/phpmyadmin/?pma_username=root&password=foo). Such behavior was discouraged and is now removed. Other query parameters work as expected; only pma_username and pma_password have been removed.

This release also includes fixes for many bugs, including:

- Several issues with SYSTEM VERSIONING tables
- Fixed json encode error in export
- Fixed JavaScript events not activating on input (sql bookmark issue)
- Show Designer combo boxes when adding a constraint
- Fix edit view
- Fixed invalid default value for bit field
- Fix several errors relating to GIS data types
- Fixed javascript error PMA_messages is not defined
- Fixed import XML data with leading zeros
- Fixed php notice, added support for 'DELETE HISTORY' table privilege (MariaDB >= 10.3.4)
- Fixed MySQL 8.0.0 issues with GIS display
- Fixed "Server charset" in "Database server" tab showing wrong information
- Fixed can not copy user on Percona Server 5.7
- Updated sql-parser to version 4.3.2, which fixes several parsing and linting problems

There are many, many more bug fixes thanks to the efforts of our developers, Google Summer of Code applicants, and other contributors.

The phpMyAdmin team

This is the official changelog link for phpMyAdmin v4.9.0: https://www.phpmyadmin.net/files/4.9.0/

Welcome to phpMyAdmin 4.9.0, a bugfix release that includes important security fixes.

This release fixes two security vulnerabilities:

* PMASA-2019-3 is an SQL injection flaw in the Designer feature
* PMASA-2019-4 is a CSRF attack that's possible through the 'cookie' login form

Upgrading is highly recommended for all users. Using the 'http' auth_type instead of 'cookie' can mitigate the CSRF attack.

The solution for the CSRF attack does remove the former functionality to log in directly through URL parameters (as mentioned in FAQ 4.8, such as https://example.com/phpmyadmin/?pma_username=root&password=foo). Such behavior was discouraged and is now removed. Other query parameters work as expected; only pma_username and pma_password have been removed.

This release also includes fixes for many bugs, including:

- Several issues with SYSTEM VERSIONING tables
- Fixed json encode error in export
- Fixed JavaScript events not activating on input (sql bookmark issue)
- Show Designer combo boxes when adding a constraint
- Fix edit view
- Fixed invalid default value for bit field
- Fix several errors relating to GIS data types
- Fixed javascript error PMA_messages is not defined
- Fixed import XML data with leading zeros
- Fixed php notice, added support for 'DELETE HISTORY' table privilege (MariaDB >= 10.3.4)
- Fixed MySQL 8.0.0 issues with GIS display
- Fixed "Server charset" in "Database server" tab showing wrong information
- Fixed can not copy user on Percona Server 5.7
- Updated sql-parser to version 4.3.2, which fixes several parsing and linting problems

There are many, many more bug fixes thanks to the efforts of our developers, Google Summer of Code applicants, and other contributors.

The phpMyAdmin team

This is the official changelog link for phpMyAdmin v4.8.5: https://www.phpmyadmin.net/files/4.8.5/

The phpMyAdmin team announces the release of phpMyAdmin version 4.8.5. Among other bug fixes, this contains several important security fixes. Upgrading is highly recommended for all users.

The security fixes involve:

  * Arbitrary file read vulnerability (https://www.phpmyadmin.net/security/PMASA-2019-1)
  * SQL injection in the Designer interface (https://www.phpmyadmin.net/security/PMASA-2019-2)

The arbitrary file read vulnerability could also be exploited to delete arbitrary files on the server. This attack requires that phpMyAdmin be run with the $cfg['AllowArbitraryServer'] directive set to true, which is not the default. An attacker must run a malicious server process that will masquerade as a MySQL server. This exploit has been found and fixed recently in several other related projects and appears to be caused by a bug in PHP (https://bugs.php.net/bug.php?id=77496).

In addition to the security fixes, this release also includes these bug fixes and more as part of our regular release cycle:

  * Export to SQL format not available
  * QR code not shown when adding two-factor authentication to a user account
  * Issue with adding a new user in MySQL 8.0.11 and newer
  * Frozen interface relating to Text_Plain_Sql plugin
  * Table level Operations tab was missing

And several more. Complete notes are in the ChangeLog file included with this release.

As always, downloads are available at https://www.phpmyadmin.net/downloads/

This is the official changelog link for phpMyAdmin v4.8.4: https://www.phpmyadmin.net/files/4.8.4/

The phpMyAdmin team announces the release of phpMyAdmin version 4.8.4. Among other bug fixes, this contains several important security fixes. Upgrading is highly recommended for all users.

The security fixes involve:

  * Local file inclusion (https://www.phpmyadmin.net/security/PMASA-2018-6/),
  * XSRF/CSRF vulnerabilities allowing a specially-crafted URL to perform harmful operations (https://www.phpmyadmin.net/security/PMASA-2018-7/), and
  * an XSS vulnerability in the navigation tree (https://www.phpmyadmin.net/security/PMASA-2018-8/)

In addition to the security fixes, this release also includes these bug fixes and more as part of our regular release cycle:

  * Issue with changing theme
  * Ensure that database names with a dot ('.') are handled properly when DisableIS is true
  * Fix for message "Error while copying database (pma__column_info)"
  * Move operation causes "SELECT * FROM `undefined`" error
  * When logging with $cfg['AuthLog'] to syslog, successful login messages were not logged when $cfg['AuthLogSuccess'] was true
  * Multiple errors and regressions with Designer

And several more. Complete notes are in the ChangeLog file included with this release.

Note that for this release, we experimented with a pre-release announcement so that hosting providers and package managers would have an opportunity to prepare for the security release. If this was helpful to you or if you have feedback about this technique, please let us know through the public list developers@phpmyadmin.net or privately at security@phpmyadmin.net. We may or may not decide use this behavior in the future and your feedback will help us decide whether it's beneficial to the community.

As always, downloads are available at https://www.phpmyadmin.net/downloads/

This is the official changelog link for phpMyAdmin v4.8.3: https://www.phpmyadmin.net/files/4.8.3/

The phpMyAdmin team is pleased to announce the release of phpMyAdmin version 4.8.2. Among other bug fixes, this contains a security fix for an issue that can be exploited when importing files.

A flaw was discovered with how warning messages are displayed while importing a file. This attack requires a specially-crafted file but can allow an attacker to trick the user in to executing a cross-site scripting (XSS) attack. We recommend updating immediately to mitigate this attack.

In addition to the security fixes, this release also includes these bug fixes and more as part of our regular release cycle:

* An error where a database is named 0
* Fix for NULL as default not being shown
* Fix for recent tables list
* Fix for slow performance with table filtering
* Two-factor authentication (2FA) fails if the GD PHP library is missing
* Event scheduler toggle does not work
* ERR_BLOCKED_BY_XSS_AUDITOR error when exporting a table
* PHP 7.3 warning: "continue" in "switch" is equal to "break"

And several more. Complete notes are in the ChangeLog file included with this release.

As always, downloads are available at https://www.phpmyadmin.net/downloads/

This is the official changelog link for phpMyAdmin v4.8.2: https://www.phpmyadmin.net/files/4.8.2/

The phpMyAdmin team is pleased to announce the release of phpMyAdmin version 4.8.2. Among other bug fixes, this contains an important security update and it is highly recommended that all users upgrade immediately.

The urgent vulnerability allows an authenticated attacker to exploit a phpMyAdmin feature to show and potentially execute files on the server. PHP open_basedir restrictions mitigate the effect of this flaw. For further details, see the PMASA announcement .

A second flaw was also fixed allowing an attacker to use a specially crafted database name to trick a user in to executing a cross-site scripting (XSS) attack in the Designer feature .

In addition to the security fixes, this release also includes these bug fixes as part of our regular release cycle:

* WHERE 0 clause causes a fatal error
* Fix missing "INDEX" icon

Downloads are available at https://www.phpmyadmin.net/downloads/

This is the official changelog link for phpMyAdmin v4.8.1: https://www.phpmyadmin.net/files/4.8.1/

This is the official changelog link for phpMyAdmin v4.8.0.1: https://www.phpmyadmin.net/files/4.8.0.1/

I know you are always very busy developing CWP but i hope you can consider this suggestion of mine which i believe would be appreciated by all users of CWP (Centos Web Panel) and CWP (Centos Web Panel) PRO !

Thanks in advance for the support.


« Stay hungry, stay foolish. »

Offline
*
Yes, we need upgrade phpMyadmin (need php 7.1.3+)
I tried it, but version of php using for cwpservice is PHP 7.0.32

So we need upgrade php of cwpservice to 7.1.3+

====== How to check web config =====
/usr/local/cwpsrv/conf/cwp_services.conf => get link php version
== Read line: fastcgi_pass    unix:/usr/local/cwp/php71/var/sockets/cwpsvc.sock;
# /usr/local/cwp/php71/bin/php -v
PHP 7.0.32 (cli) (built: Oct  2 2018 06:39:45)




P/s:
I upgraded to 4.9.5 to protect my db ( but auto loged not working - no problerm)
This option is better than 9.7.xx
« Last Edit: March 26, 2020, 06:40:54 AM by vipony12 »