Update CVE-2019-12616.yaml
parent
78cca01d07
commit
5d51c6235d
|
@ -2,7 +2,7 @@ id: CVE-2019-12616
|
||||||
|
|
||||||
info:
|
info:
|
||||||
name: phpMyAdmin CSRF
|
name: phpMyAdmin CSRF
|
||||||
author: Mohammedsaneem, philippedelteil
|
author: Mohammedsaneem,philippedelteil
|
||||||
description: A vulnerability was found that allows an attacker to trigger a CSRF attack against a phpMyAdmin user. The attacker can trick the user, for instance through a broken <img> tag pointing at the victim's phpMyAdmin database, and the attacker can potentially deliver a payload (such as a specific INSERT or DELETE statement) through the victim.
|
description: A vulnerability was found that allows an attacker to trigger a CSRF attack against a phpMyAdmin user. The attacker can trick the user, for instance through a broken <img> tag pointing at the victim's phpMyAdmin database, and the attacker can potentially deliver a payload (such as a specific INSERT or DELETE statement) through the victim.
|
||||||
severity: medium
|
severity: medium
|
||||||
tags: cve,cve2019,phpmyadmin,csrf
|
tags: cve,cve2019,phpmyadmin,csrf
|
||||||
|
@ -15,20 +15,25 @@ requests:
|
||||||
- method: GET
|
- method: GET
|
||||||
path:
|
path:
|
||||||
- "{{BaseURL}}/phpmyadmin/"
|
- "{{BaseURL}}/phpmyadmin/"
|
||||||
|
|
||||||
matchers-condition: and
|
matchers-condition: and
|
||||||
matchers:
|
matchers:
|
||||||
|
|
||||||
- type: word
|
- type: word
|
||||||
words:
|
words:
|
||||||
- "phpMyAdmin"
|
- "phpMyAdmin"
|
||||||
|
|
||||||
- type: regex
|
- type: regex
|
||||||
regex:
|
regex:
|
||||||
- 'v=([1-4]\.[0-8].*)' #4.9.0.1
|
- 'v=([1-4]\.[0-8].*)' #4.9.0.1
|
||||||
- 'v=4.9.0.1'
|
- 'v=4.9.0.1'
|
||||||
condition: or
|
condition: or
|
||||||
|
|
||||||
- type: status
|
- type: status
|
||||||
status:
|
status:
|
||||||
- 200
|
- 200
|
||||||
- 401
|
- 401
|
||||||
|
|
||||||
extractors:
|
extractors:
|
||||||
- type: regex
|
- type: regex
|
||||||
part: body
|
part: body
|
||||||
|
|
Loading…
Reference in New Issue