漏洞信息详情
phpMyAdmin 跨站请求伪造漏洞
- CNNVD编号:CNNVD-201906-167
- 危害等级: 中危
- CVE编号: CVE-2019-12616
- 漏洞类型: 跨站请求伪造
- 发布时间: 2019-06-05
- 威胁类型: 远程
- 更新时间: 2020-11-26
- 厂 商:
- 漏洞来源: Ubuntu,Mauro Tempe...
漏洞简介
phpMyAdmin是phpMyAdmin团队的一套免费的、基于Web的MySQL数据库管理工具。该工具能够创建和删除数据库,创建、删除、修改数据库表,执行SQL脚本命令等。
phpMyAdmin 4.9.0之前版本中存在跨站请求伪造漏洞。该漏洞源于WEB应用未充分验证请求是否来自可信用户。攻击者可利用该漏洞通过受影响客户端向服务器发送非预期的请求。
漏洞公告
目前厂商已发布升级补丁以修复漏洞,补丁获取链接:
https://www.phpmyadmin.net/security/PMASA-2019-4/
参考网址
来源:MISC
链接:http://packetstormsecurity.com/files/153251/phpMyAdmin-4.8-Cross-Site-Request-Forgery.HTML
来源:BID
链接:https://www.securityfocus.com/bid/108619
来源:www.phpmyadmin.net
链接:https://www.phpmyadmin.net/security/PMASA-2019-4/
来源:FEDORA
链接:https://lists.fedoraproject.org/archives/list/[email protected]/message/II4HC4QO6WUL2IRSQKCB66UBJOLLI5OV/
来源:BID
链接:http://www.securityfocus.com/bid/108619
来源:FEDORA
链接:https://lists.fedoraproject.org/archives/list/[email protected]/message/ZKJMYVXEDXGEGRO42T6H6VOEZJ65QPQ7/
来源:www.phpmyadmin.net
链接:http://www.phpmyadmin.net/
来源:github.com
链接:https://github.com/phpmyadmin/phpmyadmin/commit/015c404038c44279d95b6430ee5a0dddc97691ec
来源:www.phpmyadmin.net
链接:https://www.phpmyadmin.net/security/PMASA-2019-3/
来源:lists.debian.org
链接:https://lists.debian.org/debian-lts-announce/2019/06/msg00009.HTML
来源:www.auscert.org.au
链接:https://www.auscert.org.au/bulletins/ESB-2020.4193/
来源:packetstormsecurity.com
链接:https://packetstormsecurity.com/files/160149/Ubuntu-Security-Notice-USN-4639-1.HTML
来源:nvd.nist.gov
链接:https://nvd.nist.gov/vuln/detail/CVE-2019-12616
来源:vigilance.fr
链接:https://vigilance.fr/vulnerability/phpMyAdmin-Cross-Site-Request-Forgery-via-Login-Form-29465
来源:www.auscert.org.au
链接:https://www.auscert.org.au/bulletins/ESB-2019.2016/
来源:www.auscert.org.au
链接:https://www.auscert.org.au/bulletins/ESB-2019.2138/
来源:www.securityfocus.com
链接:https://www.securityfocus.com/bid/108619
受影响实体
暂无
补丁
- phpMyAdmin 跨站请求伪造漏洞的修复措施
评论