2021-07-16 17:57:01 +00:00
id : CVE-2019-12616
info :
2023-01-16 17:41:15 +00:00
name : phpMyAdmin <4.9.0 - Cross-Site Request Forgery
2022-07-09 10:45:55 +00:00
author : Mohammedsaneem,philippedelteil,daffainfo
2021-07-16 17:57:01 +00:00
severity : medium
2023-01-16 17:41:15 +00:00
description : phpMyAdmin before 4.9.0 is susceptible to cross-site request forgery. An attacker can utilize a broken <img> tag which points at the victim's phpMyAdmin database, thus leading to potential delivery of a payload, such as a specific INSERT or DELETE statement.
2021-08-25 12:09:42 +00:00
reference :
- https://www.phpmyadmin.net/security/PMASA-2019-4/
- https://www.exploit-db.com/exploits/46982
- https://nvd.nist.gov/vuln/detail/CVE-2019-12616
2021-09-10 11:26:40 +00:00
classification :
cvss-metrics : CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N
2022-04-22 10:38:41 +00:00
cvss-score : 6.5
2021-09-10 11:26:40 +00:00
cve-id : CVE-2019-12616
cwe-id : CWE-352
2022-08-27 04:41:18 +00:00
tags : csrf,edb,cve,cve2019,phpmyadmin
2021-07-16 17:57:01 +00:00
requests :
- method : GET
path :
- "{{BaseURL}}/phpmyadmin/"
2021-08-08 06:50:24 +00:00
2021-07-16 17:57:01 +00:00
matchers-condition : and
matchers :
2022-07-09 10:45:55 +00:00
- type : status
status :
- 200
- 401 # password protected
2021-07-16 17:57:01 +00:00
- type : word
words :
2021-08-09 18:21:31 +00:00
- "phpmyadmin.net"
2021-08-09 21:35:43 +00:00
- "phpMyAdmin"
2021-08-12 09:37:48 +00:00
condition : or
2021-08-08 06:50:24 +00:00
2022-07-09 10:45:55 +00:00
- type : dsl
dsl :
- compare_versions(version, '< 4.9.0')
extractors :
2021-08-07 22:59:05 +00:00
- type : regex
2022-07-09 10:45:55 +00:00
name : version
internal : true
group : 1
2021-08-07 22:59:05 +00:00
regex :
2022-07-09 10:45:55 +00:00
- '\?v=([0-9.]+)'
2021-08-08 06:50:24 +00:00
2022-07-09 10:45:55 +00:00
- type : regex
group : 1
regex :
- '\?v=([0-9.]+)'
2023-01-16 17:41:15 +00:00
# Enhanced by md on 2023/01/11