Vulnerability   
Search   
    Search 324607 CVE descriptions
and 146377 test descriptions,
access 10,000+ cross references.
Tests   CVE   All  

Test ID:1.3.6.1.4.1.25623.1.0.142499
Category:Web application abuses
Title:phpMyAdmin < 4.9.0 CSRF Vulnerability (PMASA-2019-4) - Linux
Summary:phpMyAdmin is prone to a CSRF vulnerability.
Description:Summary:
phpMyAdmin is prone to a CSRF vulnerability.

Vulnerability Insight:
A vulnerability was found that allows an attacker to trigger a CSRF attack
against a phpMyAdmin user. The attacker can trick the user, for instance through a broken tag pointing at
the victim's phpMyAdmin database, and the attacker can potentially deliver a payload (such as a specific INSERT
or DELETE statement) through the victim.

Affected Software/OS:
phpMyAdmin prior to version 4.9.0.

Solution:
Update to version 4.9.0 or later.

CVSS Score:
4.3

CVSS Vector:
AV:N/AC:M/Au:N/C:N/I:P/A:N

Cross-Ref: Common Vulnerability Exposure (CVE) ID: CVE-2019-12616
BugTraq ID: 108619
http://www.securityfocus.com/bid/108619
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/II4HC4QO6WUL2IRSQKCB66UBJOLLI5OV/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/ZKJMYVXEDXGEGRO42T6H6VOEZJ65QPQ7/
http://packetstormsecurity.com/files/153251/phpMyAdmin-4.8-Cross-Site-Request-Forgery.html
https://www.phpmyadmin.net/security/
https://lists.debian.org/debian-lts-announce/2019/06/msg00009.html
SuSE Security Announcement: openSUSE-SU-2019:1689 (Google Search)
http://lists.opensuse.org/opensuse-security-announce/2019-07/msg00005.html
SuSE Security Announcement: openSUSE-SU-2019:1861 (Google Search)
http://lists.opensuse.org/opensuse-security-announce/2019-08/msg00017.html
CopyrightCopyright (C) 2019 Greenbone AG

This is only one of 146377 vulnerability tests in our test suite. Find out more about running a complete security audit.

To run a free test of this vulnerability against your system, register below.




© 1998-2025 E-Soft Inc. All rights reserved.