2021-07-16 17:57:01 +00:00
id : CVE-2019-12616
info :
2023-01-16 17:41:15 +00:00
name : phpMyAdmin <4.9.0 - Cross-Site Request Forgery
2022-07-09 10:45:55 +00:00
author : Mohammedsaneem,philippedelteil,daffainfo
2021-07-16 17:57:01 +00:00
severity : medium
2023-01-16 17:41:15 +00:00
description : phpMyAdmin before 4.9.0 is susceptible to cross-site request forgery. An attacker can utilize a broken <img> tag which points at the victim's phpMyAdmin database, thus leading to potential delivery of a payload, such as a specific INSERT or DELETE statement.
2023-09-27 15:51:13 +00:00
impact : |
An attacker can trick an authenticated user into performing unintended actions on the phpMyAdmin application.
2023-09-06 12:53:28 +00:00
remediation : |
Upgrade phpMyAdmin to version 4.9.0 or later to mitigate the CSRF vulnerability.
2021-08-25 12:09:42 +00:00
reference :
- https://www.phpmyadmin.net/security/PMASA-2019-4/
- https://www.exploit-db.com/exploits/46982
- https://nvd.nist.gov/vuln/detail/CVE-2019-12616
2023-07-11 19:49:27 +00:00
- http://lists.opensuse.org/opensuse-security-announce/2019-07/msg00005.html
- http://lists.opensuse.org/opensuse-security-announce/2019-08/msg00017.html
2021-09-10 11:26:40 +00:00
classification :
cvss-metrics : CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N
2022-04-22 10:38:41 +00:00
cvss-score : 6.5
2021-09-10 11:26:40 +00:00
cve-id : CVE-2019-12616
cwe-id : CWE-352
2024-03-23 09:28:19 +00:00
epss-score : 0.01696
epss-percentile : 0.87461
2023-09-06 12:53:28 +00:00
cpe : cpe:2.3:a:phpmyadmin:phpmyadmin:*:*:*:*:*:*:*:*
2023-04-28 08:11:21 +00:00
metadata :
max-request : 1
2023-07-11 19:49:27 +00:00
vendor : phpmyadmin
product : phpmyadmin
2024-01-14 09:21:50 +00:00
tags : cve2019,cve,csrf,edb,phpmyadmin
2021-07-16 17:57:01 +00:00
2023-04-27 04:28:59 +00:00
http :
2021-07-16 17:57:01 +00:00
- method : GET
path :
- "{{BaseURL}}/phpmyadmin/"
2021-08-08 06:50:24 +00:00
2021-07-16 17:57:01 +00:00
matchers-condition : and
matchers :
2023-07-11 19:49:27 +00:00
- type : dsl
dsl :
- compare_versions(version, '< 4.9.0')
2022-07-09 10:45:55 +00:00
2021-07-16 17:57:01 +00:00
- type : word
words :
2021-08-09 18:21:31 +00:00
- "phpmyadmin.net"
2021-08-09 21:35:43 +00:00
- "phpMyAdmin"
2021-08-12 09:37:48 +00:00
condition : or
2021-08-08 06:50:24 +00:00
2023-07-11 19:49:27 +00:00
- type : status
status :
- 200
- 401 # password protected
2022-07-09 10:45:55 +00:00
extractors :
2021-08-07 22:59:05 +00:00
- type : regex
2022-07-09 10:45:55 +00:00
name : version
group : 1
2021-08-07 22:59:05 +00:00
regex :
2022-07-09 10:45:55 +00:00
- '\?v=([0-9.]+)'
2023-07-11 19:49:27 +00:00
internal : true
2021-08-08 06:50:24 +00:00
2022-07-09 10:45:55 +00:00
- type : regex
group : 1
regex :
- '\?v=([0-9.]+)'
2024-03-25 11:57:16 +00:00
# digest: 4b0a00483046022100ff8c851c74b80d9406f46e884bd52022d64db4601ef5803198cc3be69b3aab1602210099243bd82990fc8f8299c10bf31f6090c6abd3cbcf416c953a436b4572c245a7:922c64590222798bb761d5b6d8e72950