An issue was discovered in phpMyAdmin. By calling some scripts that are part of phpMyAdmin in an unexpected way, it is possible to trigger phpMyAdmin to display a PHP error message which contains the full path of the directory where phpMyAdmin is installed. During an execution timeout in the export functionality, the errors containing the full path of the directory of phpMyAdmin are written to the export file. All 4.6.x versions (prior to 4.6.5), and 4.4.x versions (prior to 4.4.15.9) are affected. This CVE is for the json_decode issue.
References
Link | Resource |
---|---|
http://www.securityfocus.com/bid/94527 | Third Party Advisory VDB Entry |
https://security.gentoo.org/glsa/201701-32 | |
https://www.phpmyadmin.net/security/PMASA-2016-63 | Patch Vendor Advisory |
http://www.securityfocus.com/bid/94527 | Third Party Advisory VDB Entry |
https://security.gentoo.org/glsa/201701-32 | |
https://www.phpmyadmin.net/security/PMASA-2016-63 | Patch Vendor Advisory |
Configurations
Configuration 1 (hide)
|
Configuration 2 (hide)
|
History
21 Nov 2024, 03:01
Type | Values Removed | Values Added |
---|---|---|
References | () http://www.securityfocus.com/bid/94527 - Third Party Advisory, VDB Entry | |
References | () https://security.gentoo.org/glsa/201701-32 - | |
References | () https://www.phpmyadmin.net/security/PMASA-2016-63 - Patch, Vendor Advisory |
Information
Published : 2016-12-11 02:59
Updated : 2024-11-21 03:01
NVD link : CVE-2016-9854
Mitre link : CVE-2016-9854
CVE.ORG link : CVE-2016-9854
JSON object : View
Products Affected
phpmyadmin
- phpmyadmin
CWE
CWE-200
Exposure of Sensitive Information to an Unauthorized Actor