CVE-2011-0987

The PMA_Bookmark_get function in libraries/bookmark.lib.php in phpMyAdmin 2.11.x before 2.11.11.3, and 3.3.x before 3.3.9.2, does not properly restrict bookmark queries, which makes it easier for remote authenticated users to trigger another user's execution of a SQL query by creating a bookmark.
References
Link Resource
http://lists.fedoraproject.org/pipermail/package-announce/2011-February/054349.html
http://lists.fedoraproject.org/pipermail/package-announce/2011-February/054355.html
http://lists.fedoraproject.org/pipermail/package-announce/2011-March/054525.html
http://phpmyadmin.git.sourceforge.net/git/gitweb.cgi?p=phpmyadmin/phpmyadmin%3Ba=commit%3Bh=a5464b4daff0059cdf8c9e5f4d54a80e2dd2a5b0
http://secunia.com/advisories/43324
http://secunia.com/advisories/43391
http://secunia.com/advisories/43478
http://www.debian.org/security/2011/dsa-2167
http://www.mandriva.com/security/advisories?name=MDVSA-2011:026
http://www.phpmyadmin.net/home_page/security/PMASA-2011-2.php Patch Vendor Advisory
http://www.securityfocus.com/bid/46359
http://www.vupen.com/english/advisories/2011/0381 Vendor Advisory
http://www.vupen.com/english/advisories/2011/0385
http://www.vupen.com/english/advisories/2011/0409
http://www.vupen.com/english/advisories/2011/0512
http://www.vupen.com/english/advisories/2011/0570
https://exchange.xforce.ibmcloud.com/vulnerabilities/65390
http://lists.fedoraproject.org/pipermail/package-announce/2011-February/054349.html
http://lists.fedoraproject.org/pipermail/package-announce/2011-February/054355.html
http://lists.fedoraproject.org/pipermail/package-announce/2011-March/054525.html
http://phpmyadmin.git.sourceforge.net/git/gitweb.cgi?p=phpmyadmin/phpmyadmin%3Ba=commit%3Bh=a5464b4daff0059cdf8c9e5f4d54a80e2dd2a5b0
http://secunia.com/advisories/43324
http://secunia.com/advisories/43391
http://secunia.com/advisories/43478
http://www.debian.org/security/2011/dsa-2167
http://www.mandriva.com/security/advisories?name=MDVSA-2011:026
http://www.phpmyadmin.net/home_page/security/PMASA-2011-2.php Patch Vendor Advisory
http://www.securityfocus.com/bid/46359
http://www.vupen.com/english/advisories/2011/0381 Vendor Advisory
http://www.vupen.com/english/advisories/2011/0385
http://www.vupen.com/english/advisories/2011/0409
http://www.vupen.com/english/advisories/2011/0512
http://www.vupen.com/english/advisories/2011/0570
https://exchange.xforce.ibmcloud.com/vulnerabilities/65390
Configurations

Configuration 1 (hide)

OR cpe:2.3:a:phpmyadmin:phpmyadmin:2.11.0:*:*:*:*:*:*:*
cpe:2.3:a:phpmyadmin:phpmyadmin:2.11.1.0:*:*:*:*:*:*:*
cpe:2.3:a:phpmyadmin:phpmyadmin:2.11.1.1:*:*:*:*:*:*:*
cpe:2.3:a:phpmyadmin:phpmyadmin:2.11.1.2:*:*:*:*:*:*:*
cpe:2.3:a:phpmyadmin:phpmyadmin:2.11.2.0:*:*:*:*:*:*:*
cpe:2.3:a:phpmyadmin:phpmyadmin:2.11.2.1:*:*:*:*:*:*:*
cpe:2.3:a:phpmyadmin:phpmyadmin:2.11.2.2:*:*:*:*:*:*:*
cpe:2.3:a:phpmyadmin:phpmyadmin:2.11.3.0:*:*:*:*:*:*:*
cpe:2.3:a:phpmyadmin:phpmyadmin:2.11.4.0:*:*:*:*:*:*:*
cpe:2.3:a:phpmyadmin:phpmyadmin:2.11.5.0:*:*:*:*:*:*:*
cpe:2.3:a:phpmyadmin:phpmyadmin:2.11.5.1:*:*:*:*:*:*:*
cpe:2.3:a:phpmyadmin:phpmyadmin:2.11.5.2:*:*:*:*:*:*:*
cpe:2.3:a:phpmyadmin:phpmyadmin:2.11.6.0:*:*:*:*:*:*:*
cpe:2.3:a:phpmyadmin:phpmyadmin:2.11.7.0:*:*:*:*:*:*:*
cpe:2.3:a:phpmyadmin:phpmyadmin:2.11.7.1:*:*:*:*:*:*:*
cpe:2.3:a:phpmyadmin:phpmyadmin:2.11.8.0:*:*:*:*:*:*:*
cpe:2.3:a:phpmyadmin:phpmyadmin:2.11.9.0:*:*:*:*:*:*:*
cpe:2.3:a:phpmyadmin:phpmyadmin:2.11.9.1:*:*:*:*:*:*:*
cpe:2.3:a:phpmyadmin:phpmyadmin:2.11.9.2:*:*:*:*:*:*:*
cpe:2.3:a:phpmyadmin:phpmyadmin:2.11.9.3:*:*:*:*:*:*:*
cpe:2.3:a:phpmyadmin:phpmyadmin:2.11.9.4:*:*:*:*:*:*:*
cpe:2.3:a:phpmyadmin:phpmyadmin:2.11.9.5:*:*:*:*:*:*:*
cpe:2.3:a:phpmyadmin:phpmyadmin:2.11.9.6:*:*:*:*:*:*:*
cpe:2.3:a:phpmyadmin:phpmyadmin:2.11.10.0:*:*:*:*:*:*:*
cpe:2.3:a:phpmyadmin:phpmyadmin:2.11.10.1:*:*:*:*:*:*:*
cpe:2.3:a:phpmyadmin:phpmyadmin:2.11.11:*:*:*:*:*:*:*
cpe:2.3:a:phpmyadmin:phpmyadmin:2.11.11.1:*:*:*:*:*:*:*
cpe:2.3:a:phpmyadmin:phpmyadmin:2.11.11.2:*:*:*:*:*:*:*
cpe:2.3:a:phpmyadmin:phpmyadmin:3.0.0:*:*:*:*:*:*:*
cpe:2.3:a:phpmyadmin:phpmyadmin:3.0.0:alpha:*:*:*:*:*:*
cpe:2.3:a:phpmyadmin:phpmyadmin:3.0.0:beta:*:*:*:*:*:*
cpe:2.3:a:phpmyadmin:phpmyadmin:3.0.0:rc1:*:*:*:*:*:*
cpe:2.3:a:phpmyadmin:phpmyadmin:3.0.1:*:*:*:*:*:*:*
cpe:2.3:a:phpmyadmin:phpmyadmin:3.0.1:rc1:*:*:*:*:*:*
cpe:2.3:a:phpmyadmin:phpmyadmin:3.0.1.1:*:*:*:*:*:*:*
cpe:2.3:a:phpmyadmin:phpmyadmin:3.1.0:*:*:*:*:*:*:*
cpe:2.3:a:phpmyadmin:phpmyadmin:3.1.0:beta1:*:*:*:*:*:*
cpe:2.3:a:phpmyadmin:phpmyadmin:3.1.1:*:*:*:*:*:*:*
cpe:2.3:a:phpmyadmin:phpmyadmin:3.1.1:rc1:*:*:*:*:*:*
cpe:2.3:a:phpmyadmin:phpmyadmin:3.1.2:*:*:*:*:*:*:*
cpe:2.3:a:phpmyadmin:phpmyadmin:3.1.2:rc1:*:*:*:*:*:*
cpe:2.3:a:phpmyadmin:phpmyadmin:3.1.3:*:*:*:*:*:*:*
cpe:2.3:a:phpmyadmin:phpmyadmin:3.1.3:rc1:*:*:*:*:*:*
cpe:2.3:a:phpmyadmin:phpmyadmin:3.1.3.1:*:*:*:*:*:*:*
cpe:2.3:a:phpmyadmin:phpmyadmin:3.1.3.2:*:*:*:*:*:*:*
cpe:2.3:a:phpmyadmin:phpmyadmin:3.1.4:*:*:*:*:*:*:*
cpe:2.3:a:phpmyadmin:phpmyadmin:3.1.4:rc2:*:*:*:*:*:*
cpe:2.3:a:phpmyadmin:phpmyadmin:3.1.5:*:*:*:*:*:*:*
cpe:2.3:a:phpmyadmin:phpmyadmin:3.1.5:rc1:*:*:*:*:*:*
cpe:2.3:a:phpmyadmin:phpmyadmin:3.2.0:*:*:*:*:*:*:*
cpe:2.3:a:phpmyadmin:phpmyadmin:3.2.0:beta1:*:*:*:*:*:*
cpe:2.3:a:phpmyadmin:phpmyadmin:3.2.0:rc1:*:*:*:*:*:*
cpe:2.3:a:phpmyadmin:phpmyadmin:3.2.1:*:*:*:*:*:*:*
cpe:2.3:a:phpmyadmin:phpmyadmin:3.2.1:rc1:*:*:*:*:*:*
cpe:2.3:a:phpmyadmin:phpmyadmin:3.2.2:*:*:*:*:*:*:*
cpe:2.3:a:phpmyadmin:phpmyadmin:3.2.2:rc1:*:*:*:*:*:*
cpe:2.3:a:phpmyadmin:phpmyadmin:3.3.0.0:*:*:*:*:*:*:*
cpe:2.3:a:phpmyadmin:phpmyadmin:3.3.1.0:*:*:*:*:*:*:*
cpe:2.3:a:phpmyadmin:phpmyadmin:3.3.2.0:*:*:*:*:*:*:*
cpe:2.3:a:phpmyadmin:phpmyadmin:3.3.3.0:*:*:*:*:*:*:*
cpe:2.3:a:phpmyadmin:phpmyadmin:3.3.4.0:*:*:*:*:*:*:*
cpe:2.3:a:phpmyadmin:phpmyadmin:3.3.5.0:*:*:*:*:*:*:*
cpe:2.3:a:phpmyadmin:phpmyadmin:3.3.5.1:*:*:*:*:*:*:*
cpe:2.3:a:phpmyadmin:phpmyadmin:3.3.6:*:*:*:*:*:*:*
cpe:2.3:a:phpmyadmin:phpmyadmin:3.3.7:*:*:*:*:*:*:*
cpe:2.3:a:phpmyadmin:phpmyadmin:3.3.8:*:*:*:*:*:*:*
cpe:2.3:a:phpmyadmin:phpmyadmin:3.3.8.1:*:*:*:*:*:*:*
cpe:2.3:a:phpmyadmin:phpmyadmin:3.3.9.0:*:*:*:*:*:*:*
cpe:2.3:a:phpmyadmin:phpmyadmin:3.3.9.1:*:*:*:*:*:*:*

History

21 Nov 2024, 01:25

Type Values Removed Values Added
References () http://lists.fedoraproject.org/pipermail/package-announce/2011-February/054349.html - () http://lists.fedoraproject.org/pipermail/package-announce/2011-February/054349.html -
References () http://lists.fedoraproject.org/pipermail/package-announce/2011-February/054355.html - () http://lists.fedoraproject.org/pipermail/package-announce/2011-February/054355.html -
References () http://lists.fedoraproject.org/pipermail/package-announce/2011-March/054525.html - () http://lists.fedoraproject.org/pipermail/package-announce/2011-March/054525.html -
References () http://phpmyadmin.git.sourceforge.net/git/gitweb.cgi?p=phpmyadmin/phpmyadmin%3Ba=commit%3Bh=a5464b4daff0059cdf8c9e5f4d54a80e2dd2a5b0 - () http://phpmyadmin.git.sourceforge.net/git/gitweb.cgi?p=phpmyadmin/phpmyadmin%3Ba=commit%3Bh=a5464b4daff0059cdf8c9e5f4d54a80e2dd2a5b0 -
References () http://secunia.com/advisories/43324 - () http://secunia.com/advisories/43324 -
References () http://secunia.com/advisories/43391 - () http://secunia.com/advisories/43391 -
References () http://secunia.com/advisories/43478 - () http://secunia.com/advisories/43478 -
References () http://www.debian.org/security/2011/dsa-2167 - () http://www.debian.org/security/2011/dsa-2167 -
References () http://www.mandriva.com/security/advisories?name=MDVSA-2011:026 - () http://www.mandriva.com/security/advisories?name=MDVSA-2011:026 -
References () http://www.phpmyadmin.net/home_page/security/PMASA-2011-2.php - Patch, Vendor Advisory () http://www.phpmyadmin.net/home_page/security/PMASA-2011-2.php - Patch, Vendor Advisory
References () http://www.securityfocus.com/bid/46359 - () http://www.securityfocus.com/bid/46359 -
References () http://www.vupen.com/english/advisories/2011/0381 - Vendor Advisory () http://www.vupen.com/english/advisories/2011/0381 - Vendor Advisory
References () http://www.vupen.com/english/advisories/2011/0385 - () http://www.vupen.com/english/advisories/2011/0385 -
References () http://www.vupen.com/english/advisories/2011/0409 - () http://www.vupen.com/english/advisories/2011/0409 -
References () http://www.vupen.com/english/advisories/2011/0512 - () http://www.vupen.com/english/advisories/2011/0512 -
References () http://www.vupen.com/english/advisories/2011/0570 - () http://www.vupen.com/english/advisories/2011/0570 -
References () https://exchange.xforce.ibmcloud.com/vulnerabilities/65390 - () https://exchange.xforce.ibmcloud.com/vulnerabilities/65390 -

07 Nov 2023, 02:06

Type Values Removed Values Added
References
  • {'url': 'http://phpmyadmin.git.sourceforge.net/git/gitweb.cgi?p=phpmyadmin/phpmyadmin;a=commit;h=a5464b4daff0059cdf8c9e5f4d54a80e2dd2a5b0', 'name': 'http://phpmyadmin.git.sourceforge.net/git/gitweb.cgi?p=phpmyadmin/phpmyadmin;a=commit;h=a5464b4daff0059cdf8c9e5f4d54a80e2dd2a5b0', 'tags': ['Patch'], 'refsource': 'CONFIRM'}
  • () http://phpmyadmin.git.sourceforge.net/git/gitweb.cgi?p=phpmyadmin/phpmyadmin%3Ba=commit%3Bh=a5464b4daff0059cdf8c9e5f4d54a80e2dd2a5b0 -

Information

Published : 2011-02-14 22:00

Updated : 2024-11-21 01:25


NVD link : CVE-2011-0987

Mitre link : CVE-2011-0987

CVE.ORG link : CVE-2011-0987


JSON object : View

Products Affected

phpmyadmin

  • phpmyadmin
CWE
CWE-20

Improper Input Validation