{"vulnerability": "CVE-2019-6799", "sightings": [{"uuid": "8f6f3371-4efc-40ab-a760-2982ee0c15d8", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2019-6799", "type": "seen", "source": "https://t.me/arpsyndicate/4867", "content": "#ExploitObserverAlert\n\nCVE-2019-6799\n\nDESCRIPTION: Exploit Observer has 17 entries in 10 file formats related to CVE-2019-6799. An issue was discovered in phpMyAdmin before 4.8.5. When the AllowArbitraryServer configuration setting is set to true, with the use of a rogue MySQL server, an attacker can read any file on the server that the web server's user can access. This is related to the mysql.allow_local_infile PHP configuration, and the inadvertent ignoring of \"options(MYSQLI_OPT_LOCAL_INFILE\" calls.\n\nFIRST-EPSS: 0.182900000\nNVD-IS: 3.6\nNVD-ES: 2.2\nARPS-PRIORITY: 0.9624088", "creation_timestamp": "2024-04-25T21:21:05.000000Z"}]}