phpMyAdmin before 4.6.2 places tokens in query strings and does not arrange for them to be stripped before external navigation, which allows remote attackers to obtain sensitive information by reading (1) HTTP requests or (2) server logs.
References
Configurations
History
21 Nov 2024, 02:53
Type | Values Removed | Values Added |
---|---|---|
References | () http://lists.opensuse.org/opensuse-updates/2016-06/msg00043.html - | |
References | () http://www.securitytracker.com/id/1035978 - | |
References | () https://github.com/phpmyadmin/phpmyadmin/commit/11eb574242d2526107366d367ab5585fbe29578f - Patch | |
References | () https://github.com/phpmyadmin/phpmyadmin/commit/59e56bd63a5e023b797d82eb272cd074e3b4bfd1 - Patch | |
References | () https://github.com/phpmyadmin/phpmyadmin/commit/5fc8020c5ba9cd2e38beb5dfe013faf2103cdf0f - Patch | |
References | () https://github.com/phpmyadmin/phpmyadmin/commit/8326aaebe54083d9726e153abdd303a141fe5ad3 - Patch | |
References | () https://security.gentoo.org/glsa/201701-32 - | |
References | () https://www.phpmyadmin.net/security/PMASA-2016-14 - Patch, Vendor Advisory |
Information
Published : 2016-07-05 01:59
Updated : 2024-11-21 02:53
NVD link : CVE-2016-5097
Mitre link : CVE-2016-5097
CVE.ORG link : CVE-2016-5097
JSON object : View
Products Affected
opensuse
- opensuse
phpmyadmin
- phpmyadmin
CWE
CWE-200
Exposure of Sensitive Information to an Unauthorized Actor