Update CVE-2019-12616.yaml

patch-1
sandeep 2021-08-08 12:20:24 +05:30
parent 78cca01d07
commit 5d51c6235d
1 changed files with 6 additions and 1 deletions

View File

@ -2,7 +2,7 @@ id: CVE-2019-12616
info: info:
name: phpMyAdmin CSRF name: phpMyAdmin CSRF
author: Mohammedsaneem, philippedelteil author: Mohammedsaneem,philippedelteil
description: A vulnerability was found that allows an attacker to trigger a CSRF attack against a phpMyAdmin user. The attacker can trick the user, for instance through a broken <img> tag pointing at the victim's phpMyAdmin database, and the attacker can potentially deliver a payload (such as a specific INSERT or DELETE statement) through the victim. description: A vulnerability was found that allows an attacker to trigger a CSRF attack against a phpMyAdmin user. The attacker can trick the user, for instance through a broken <img> tag pointing at the victim's phpMyAdmin database, and the attacker can potentially deliver a payload (such as a specific INSERT or DELETE statement) through the victim.
severity: medium severity: medium
tags: cve,cve2019,phpmyadmin,csrf tags: cve,cve2019,phpmyadmin,csrf
@ -15,20 +15,25 @@ requests:
- method: GET - method: GET
path: path:
- "{{BaseURL}}/phpmyadmin/" - "{{BaseURL}}/phpmyadmin/"
matchers-condition: and matchers-condition: and
matchers: matchers:
- type: word - type: word
words: words:
- "phpMyAdmin" - "phpMyAdmin"
- type: regex - type: regex
regex: regex:
- 'v=([1-4]\.[0-8].*)' #4.9.0.1 - 'v=([1-4]\.[0-8].*)' #4.9.0.1
- 'v=4.9.0.1' - 'v=4.9.0.1'
condition: or condition: or
- type: status - type: status
status: status:
- 200 - 200
- 401 - 401
extractors: extractors:
- type: regex - type: regex
part: body part: body