CVE-2008-1149

phpMyAdmin before 2.11.5 accesses $_REQUEST to obtain some parameters instead of $_GET and $_POST, which allows attackers in the same domain to override certain variables and conduct SQL injection and Cross-Site Request Forgery (CSRF) attacks by using crafted cookies.
References
Link Resource
http://lists.opensuse.org/opensuse-security-announce/2008-11/msg00002.html
http://lists.opensuse.org/opensuse-security-announce/2009-02/msg00000.html
http://secunia.com/advisories/29143 Vendor Advisory
http://secunia.com/advisories/29200 Vendor Advisory
http://secunia.com/advisories/29287 Vendor Advisory
http://secunia.com/advisories/29964 Vendor Advisory
http://secunia.com/advisories/30816 Vendor Advisory
http://secunia.com/advisories/32834 Vendor Advisory
http://secunia.com/advisories/33822 Vendor Advisory
http://www.debian.org/security/2008/dsa-1557 Patch
http://www.gentoo.org/security/en/glsa/glsa-200803-15.xml
http://www.mandriva.com/security/advisories?name=MDVSA-2008:131
http://www.phpmyadmin.net/home_page/security.php?issue=PMASA-2008-1 Patch Vendor Advisory
http://www.securityfocus.com/bid/28068 Patch
http://www.vupen.com/english/advisories/2008/0731 Vendor Advisory
http://www.vupen.com/english/advisories/2008/0758 Vendor Advisory
https://exchange.xforce.ibmcloud.com/vulnerabilities/40968
https://www.redhat.com/archives/fedora-package-announce/2008-March/msg00069.html
https://www.redhat.com/archives/fedora-package-announce/2008-March/msg00100.html
http://lists.opensuse.org/opensuse-security-announce/2008-11/msg00002.html
http://lists.opensuse.org/opensuse-security-announce/2009-02/msg00000.html
http://secunia.com/advisories/29143 Vendor Advisory
http://secunia.com/advisories/29200 Vendor Advisory
http://secunia.com/advisories/29287 Vendor Advisory
http://secunia.com/advisories/29964 Vendor Advisory
http://secunia.com/advisories/30816 Vendor Advisory
http://secunia.com/advisories/32834 Vendor Advisory
http://secunia.com/advisories/33822 Vendor Advisory
http://www.debian.org/security/2008/dsa-1557 Patch
http://www.gentoo.org/security/en/glsa/glsa-200803-15.xml
http://www.mandriva.com/security/advisories?name=MDVSA-2008:131
http://www.phpmyadmin.net/home_page/security.php?issue=PMASA-2008-1 Patch Vendor Advisory
http://www.securityfocus.com/bid/28068 Patch
http://www.vupen.com/english/advisories/2008/0731 Vendor Advisory
http://www.vupen.com/english/advisories/2008/0758 Vendor Advisory
https://exchange.xforce.ibmcloud.com/vulnerabilities/40968
https://www.redhat.com/archives/fedora-package-announce/2008-March/msg00069.html
https://www.redhat.com/archives/fedora-package-announce/2008-March/msg00100.html
Configurations

Configuration 1 (hide)

OR cpe:2.3:a:phpmyadmin:phpmyadmin:*:*:*:*:*:*:*:*
cpe:2.3:a:phpmyadmin:phpmyadmin:2.11.0:*:*:*:*:*:*:*
cpe:2.3:a:phpmyadmin:phpmyadmin:2.11.0:beta1:*:*:*:*:*:*
cpe:2.3:a:phpmyadmin:phpmyadmin:2.11.0:rc1:*:*:*:*:*:*
cpe:2.3:a:phpmyadmin:phpmyadmin:2.11.0.0:*:*:*:*:*:*:*
cpe:2.3:a:phpmyadmin:phpmyadmin:2.11.1:*:*:*:*:*:*:*
cpe:2.3:a:phpmyadmin:phpmyadmin:2.11.1:rc1:*:*:*:*:*:*
cpe:2.3:a:phpmyadmin:phpmyadmin:2.11.1.0:*:*:*:*:*:*:*
cpe:2.3:a:phpmyadmin:phpmyadmin:2.11.1.1:*:*:*:*:*:*:*
cpe:2.3:a:phpmyadmin:phpmyadmin:2.11.1.2:*:*:*:*:*:*:*
cpe:2.3:a:phpmyadmin:phpmyadmin:2.11.2:*:*:*:*:*:*:*
cpe:2.3:a:phpmyadmin:phpmyadmin:2.11.2.0:*:*:*:*:*:*:*
cpe:2.3:a:phpmyadmin:phpmyadmin:2.11.2.1:*:*:*:*:*:*:*
cpe:2.3:a:phpmyadmin:phpmyadmin:2.11.2.2:*:*:*:*:*:*:*
cpe:2.3:a:phpmyadmin:phpmyadmin:2.11.3:*:*:*:*:*:*:*
cpe:2.3:a:phpmyadmin:phpmyadmin:2.11.3:rc1:*:*:*:*:*:*
cpe:2.3:a:phpmyadmin:phpmyadmin:2.11.3.0:*:*:*:*:*:*:*
cpe:2.3:a:phpmyadmin:phpmyadmin:2.11.4:rc1:*:*:*:*:*:*

History

21 Nov 2024, 00:43

Type Values Removed Values Added
References () http://lists.opensuse.org/opensuse-security-announce/2008-11/msg00002.html - () http://lists.opensuse.org/opensuse-security-announce/2008-11/msg00002.html -
References () http://lists.opensuse.org/opensuse-security-announce/2009-02/msg00000.html - () http://lists.opensuse.org/opensuse-security-announce/2009-02/msg00000.html -
References () http://secunia.com/advisories/29143 - Vendor Advisory () http://secunia.com/advisories/29143 - Vendor Advisory
References () http://secunia.com/advisories/29200 - Vendor Advisory () http://secunia.com/advisories/29200 - Vendor Advisory
References () http://secunia.com/advisories/29287 - Vendor Advisory () http://secunia.com/advisories/29287 - Vendor Advisory
References () http://secunia.com/advisories/29964 - Vendor Advisory () http://secunia.com/advisories/29964 - Vendor Advisory
References () http://secunia.com/advisories/30816 - Vendor Advisory () http://secunia.com/advisories/30816 - Vendor Advisory
References () http://secunia.com/advisories/32834 - Vendor Advisory () http://secunia.com/advisories/32834 - Vendor Advisory
References () http://secunia.com/advisories/33822 - Vendor Advisory () http://secunia.com/advisories/33822 - Vendor Advisory
References () http://www.debian.org/security/2008/dsa-1557 - Patch () http://www.debian.org/security/2008/dsa-1557 - Patch
References () http://www.gentoo.org/security/en/glsa/glsa-200803-15.xml - () http://www.gentoo.org/security/en/glsa/glsa-200803-15.xml -
References () http://www.mandriva.com/security/advisories?name=MDVSA-2008:131 - () http://www.mandriva.com/security/advisories?name=MDVSA-2008:131 -
References () http://www.phpmyadmin.net/home_page/security.php?issue=PMASA-2008-1 - Patch, Vendor Advisory () http://www.phpmyadmin.net/home_page/security.php?issue=PMASA-2008-1 - Patch, Vendor Advisory
References () http://www.securityfocus.com/bid/28068 - Patch () http://www.securityfocus.com/bid/28068 - Patch
References () http://www.vupen.com/english/advisories/2008/0731 - Vendor Advisory () http://www.vupen.com/english/advisories/2008/0731 - Vendor Advisory
References () http://www.vupen.com/english/advisories/2008/0758 - Vendor Advisory () http://www.vupen.com/english/advisories/2008/0758 - Vendor Advisory
References () https://exchange.xforce.ibmcloud.com/vulnerabilities/40968 - () https://exchange.xforce.ibmcloud.com/vulnerabilities/40968 -
References () https://www.redhat.com/archives/fedora-package-announce/2008-March/msg00069.html - () https://www.redhat.com/archives/fedora-package-announce/2008-March/msg00069.html -
References () https://www.redhat.com/archives/fedora-package-announce/2008-March/msg00100.html - () https://www.redhat.com/archives/fedora-package-announce/2008-March/msg00100.html -

Information

Published : 2008-03-04 23:44

Updated : 2024-11-21 00:43


NVD link : CVE-2008-1149

Mitre link : CVE-2008-1149

CVE.ORG link : CVE-2008-1149


JSON object : View

Products Affected

phpmyadmin

  • phpmyadmin
CWE
CWE-89

Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')

CWE-352

Cross-Site Request Forgery (CSRF)