Action not permitted
Modal body text goes here.
Modal Title
Modal Body
CVE-2022-23807 (GCVE-0-2022-23807)
Vulnerability from cvelistv5 – Published: 2022-01-22 00:00 – Updated: 2024-08-03 03:51- n/a
| URL | Tags | |
|---|---|---|
{
"containers": {
"adp": [
{
"providerMetadata": {
"dateUpdated": "2024-08-03T03:51:46.021Z",
"orgId": "af854a3a-2127-422b-91ae-364da2661108",
"shortName": "CVE"
},
"references": [
{
"tags": [
"x_transferred"
],
"url": "https://www.phpmyadmin.net/security/PMASA-2022-1/"
},
{
"name": "GLSA-202311-17",
"tags": [
"vendor-advisory",
"x_transferred"
],
"url": "https://security.gentoo.org/glsa/202311-17"
}
],
"title": "CVE Program Container"
}
],
"cna": {
"affected": [
{
"product": "n/a",
"vendor": "n/a",
"versions": [
{
"status": "affected",
"version": "n/a"
}
]
}
],
"descriptions": [
{
"lang": "en",
"value": "An issue was discovered in phpMyAdmin 4.9 before 4.9.8 and 5.1 before 5.1.2. A valid user who is already authenticated to phpMyAdmin can manipulate their account to bypass two-factor authentication for future login instances."
}
],
"problemTypes": [
{
"descriptions": [
{
"description": "n/a",
"lang": "en",
"type": "text"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2023-11-26T12:06:11.924887",
"orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
"shortName": "mitre"
},
"references": [
{
"url": "https://www.phpmyadmin.net/security/PMASA-2022-1/"
},
{
"name": "GLSA-202311-17",
"tags": [
"vendor-advisory"
],
"url": "https://security.gentoo.org/glsa/202311-17"
}
],
"source": {
"discovery": "INTERNAL"
}
}
},
"cveMetadata": {
"assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
"assignerShortName": "mitre",
"cveId": "CVE-2022-23807",
"datePublished": "2022-01-22T00:00:00",
"dateReserved": "2022-01-21T00:00:00",
"dateUpdated": "2024-08-03T03:51:46.021Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1",
"vulnerability-lookup:meta": {
"fkie_nvd": {
"configurations": "[{\"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:phpmyadmin:phpmyadmin:*:*:*:*:*:*:*:*\", \"versionStartIncluding\": \"4.9.0\", \"versionEndExcluding\": \"4.9.8\", \"matchCriteriaId\": \"5CC886AA-A01D-413D-9F3A-CF2435D94779\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:phpmyadmin:phpmyadmin:*:*:*:*:*:*:*:*\", \"versionStartIncluding\": \"5.1.0\", \"versionEndExcluding\": \"5.1.2\", \"matchCriteriaId\": \"45AFD905-B58E-42E9-9682-3CB2E644DCFF\"}]}]}]",
"descriptions": "[{\"lang\": \"en\", \"value\": \"An issue was discovered in phpMyAdmin 4.9 before 4.9.8 and 5.1 before 5.1.2. A valid user who is already authenticated to phpMyAdmin can manipulate their account to bypass two-factor authentication for future login instances.\"}, {\"lang\": \"es\", \"value\": \"Se ha detectado un problema en phpMyAdmin versiones 4.9 anteriores a 4.9.8 y 5.1 anteriores a 5.1.2. Un usuario v\\u00e1lido que ya est\\u00e1 autenticado en phpMyAdmin puede manipular su cuenta para omitir la autenticaci\\u00f3n de dos factores en futuras instancias de inicio de sesi\\u00f3n\"}]",
"id": "CVE-2022-23807",
"lastModified": "2024-11-21T06:49:17.580",
"metrics": "{\"cvssMetricV31\": [{\"source\": \"nvd@nist.gov\", \"type\": \"Primary\", \"cvssData\": {\"version\": \"3.1\", \"vectorString\": \"CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N\", \"baseScore\": 4.3, \"baseSeverity\": \"MEDIUM\", \"attackVector\": \"NETWORK\", \"attackComplexity\": \"LOW\", \"privilegesRequired\": \"LOW\", \"userInteraction\": \"NONE\", \"scope\": \"UNCHANGED\", \"confidentialityImpact\": \"NONE\", \"integrityImpact\": \"LOW\", \"availabilityImpact\": \"NONE\"}, \"exploitabilityScore\": 2.8, \"impactScore\": 1.4}], \"cvssMetricV2\": [{\"source\": \"nvd@nist.gov\", \"type\": \"Primary\", \"cvssData\": {\"version\": \"2.0\", \"vectorString\": \"AV:N/AC:L/Au:S/C:N/I:P/A:N\", \"baseScore\": 4.0, \"accessVector\": \"NETWORK\", \"accessComplexity\": \"LOW\", \"authentication\": \"SINGLE\", \"confidentialityImpact\": \"NONE\", \"integrityImpact\": \"PARTIAL\", \"availabilityImpact\": \"NONE\"}, \"baseSeverity\": \"MEDIUM\", \"exploitabilityScore\": 8.0, \"impactScore\": 2.9, \"acInsufInfo\": false, \"obtainAllPrivilege\": false, \"obtainUserPrivilege\": false, \"obtainOtherPrivilege\": false, \"userInteractionRequired\": false}]}",
"published": "2022-01-22T02:15:07.150",
"references": "[{\"url\": \"https://security.gentoo.org/glsa/202311-17\", \"source\": \"cve@mitre.org\"}, {\"url\": \"https://www.phpmyadmin.net/security/PMASA-2022-1/\", \"source\": \"cve@mitre.org\", \"tags\": [\"Patch\", \"Vendor Advisory\"]}, {\"url\": \"https://security.gentoo.org/glsa/202311-17\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\"}, {\"url\": \"https://www.phpmyadmin.net/security/PMASA-2022-1/\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Patch\", \"Vendor Advisory\"]}]",
"sourceIdentifier": "cve@mitre.org",
"vulnStatus": "Modified",
"weaknesses": "[{\"source\": \"nvd@nist.gov\", \"type\": \"Primary\", \"description\": [{\"lang\": \"en\", \"value\": \"CWE-287\"}]}]"
},
"nvd": "{\"cve\":{\"id\":\"CVE-2022-23807\",\"sourceIdentifier\":\"cve@mitre.org\",\"published\":\"2022-01-22T02:15:07.150\",\"lastModified\":\"2024-11-21T06:49:17.580\",\"vulnStatus\":\"Modified\",\"cveTags\":[],\"descriptions\":[{\"lang\":\"en\",\"value\":\"An issue was discovered in phpMyAdmin 4.9 before 4.9.8 and 5.1 before 5.1.2. A valid user who is already authenticated to phpMyAdmin can manipulate their account to bypass two-factor authentication for future login instances.\"},{\"lang\":\"es\",\"value\":\"Se ha detectado un problema en phpMyAdmin versiones 4.9 anteriores a 4.9.8 y 5.1 anteriores a 5.1.2. Un usuario v\u00e1lido que ya est\u00e1 autenticado en phpMyAdmin puede manipular su cuenta para omitir la autenticaci\u00f3n de dos factores en futuras instancias de inicio de sesi\u00f3n\"}],\"metrics\":{\"cvssMetricV31\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"3.1\",\"vectorString\":\"CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N\",\"baseScore\":4.3,\"baseSeverity\":\"MEDIUM\",\"attackVector\":\"NETWORK\",\"attackComplexity\":\"LOW\",\"privilegesRequired\":\"LOW\",\"userInteraction\":\"NONE\",\"scope\":\"UNCHANGED\",\"confidentialityImpact\":\"NONE\",\"integrityImpact\":\"LOW\",\"availabilityImpact\":\"NONE\"},\"exploitabilityScore\":2.8,\"impactScore\":1.4}],\"cvssMetricV2\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"2.0\",\"vectorString\":\"AV:N/AC:L/Au:S/C:N/I:P/A:N\",\"baseScore\":4.0,\"accessVector\":\"NETWORK\",\"accessComplexity\":\"LOW\",\"authentication\":\"SINGLE\",\"confidentialityImpact\":\"NONE\",\"integrityImpact\":\"PARTIAL\",\"availabilityImpact\":\"NONE\"},\"baseSeverity\":\"MEDIUM\",\"exploitabilityScore\":8.0,\"impactScore\":2.9,\"acInsufInfo\":false,\"obtainAllPrivilege\":false,\"obtainUserPrivilege\":false,\"obtainOtherPrivilege\":false,\"userInteractionRequired\":false}]},\"weaknesses\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"description\":[{\"lang\":\"en\",\"value\":\"CWE-287\"}]}],\"configurations\":[{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:phpmyadmin:phpmyadmin:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"4.9.0\",\"versionEndExcluding\":\"4.9.8\",\"matchCriteriaId\":\"5CC886AA-A01D-413D-9F3A-CF2435D94779\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:phpmyadmin:phpmyadmin:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"5.1.0\",\"versionEndExcluding\":\"5.1.2\",\"matchCriteriaId\":\"45AFD905-B58E-42E9-9682-3CB2E644DCFF\"}]}]}],\"references\":[{\"url\":\"https://security.gentoo.org/glsa/202311-17\",\"source\":\"cve@mitre.org\"},{\"url\":\"https://www.phpmyadmin.net/security/PMASA-2022-1/\",\"source\":\"cve@mitre.org\",\"tags\":[\"Patch\",\"Vendor Advisory\"]},{\"url\":\"https://security.gentoo.org/glsa/202311-17\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"https://www.phpmyadmin.net/security/PMASA-2022-1/\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Patch\",\"Vendor Advisory\"]}]}}"
}
}
WID-SEC-W-2022-0247
Vulnerability from csaf_certbund - Published: 2022-01-23 23:00 - Updated: 2023-11-26 23:00Notes
{
"document": {
"aggregate_severity": {
"text": "mittel"
},
"category": "csaf_base",
"csaf_version": "2.0",
"distribution": {
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "de-DE",
"notes": [
{
"category": "legal_disclaimer",
"text": "Das BSI ist als Anbieter f\u00fcr die eigenen, zur Nutzung bereitgestellten Inhalte nach den allgemeinen Gesetzen verantwortlich. Nutzerinnen und Nutzer sind jedoch daf\u00fcr verantwortlich, die Verwendung und/oder die Umsetzung der mit den Inhalten bereitgestellten Informationen sorgf\u00e4ltig im Einzelfall zu pr\u00fcfen."
},
{
"category": "description",
"text": "phpMyAdmin ist eine in PHP geschriebene Web-Oberfl\u00e4che zur Administration von MySQL Datenbanken.",
"title": "Produktbeschreibung"
},
{
"category": "summary",
"text": "Ein entfernter anonymer oder authentisierter Angreifer kann mehrere Schwachstellen in phpMyAdmin ausnutzen, um Sicherheitsvorkehrungen zu umgehen oder einen Cross Site Scripting Angriff durchzuf\u00fchren.",
"title": "Angriff"
},
{
"category": "general",
"text": "- UNIX\n- Linux\n- Windows\n- Sonstiges",
"title": "Betroffene Betriebssysteme"
}
],
"publisher": {
"category": "other",
"contact_details": "csaf-provider@cert-bund.de",
"name": "Bundesamt f\u00fcr Sicherheit in der Informationstechnik",
"namespace": "https://www.bsi.bund.de"
},
"references": [
{
"category": "self",
"summary": "WID-SEC-W-2022-0247 - CSAF Version",
"url": "https://wid.cert-bund.de/.well-known/csaf/white/2022/wid-sec-w-2022-0247.json"
},
{
"category": "self",
"summary": "WID-SEC-2022-0247 - Portal Version",
"url": "https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2022-0247"
},
{
"category": "external",
"summary": "Gentoo Linux Security Advisory GLSA-202311-17 vom 2023-11-26",
"url": "https://security.gentoo.org/glsa/202311-17"
},
{
"category": "external",
"summary": "phpMyAdmin Security Announcement vom 2022-01-23",
"url": "https://www.phpmyadmin.net/security/PMASA-2022-1/"
},
{
"category": "external",
"summary": "phpMyAdmin Security Announcement vom 2022-01-23",
"url": "https://www.phpmyadmin.net/security/PMASA-2022-2/"
},
{
"category": "external",
"summary": "PoC CVE-2022-23808 vom 2022-06-09",
"url": "https://github.com/Trhackno/CVE-2022-23808"
}
],
"source_lang": "en-US",
"title": "phpMyAdmin: Mehrere Schwachstellen",
"tracking": {
"current_release_date": "2023-11-26T23:00:00.000+00:00",
"generator": {
"date": "2024-08-15T17:27:37.685+00:00",
"engine": {
"name": "BSI-WID",
"version": "1.3.5"
}
},
"id": "WID-SEC-W-2022-0247",
"initial_release_date": "2022-01-23T23:00:00.000+00:00",
"revision_history": [
{
"date": "2022-01-23T23:00:00.000+00:00",
"number": "1",
"summary": "Initiale Fassung"
},
{
"date": "2022-01-24T23:00:00.000+00:00",
"number": "2",
"summary": "Referenz(en) aufgenommen: FEDORA-2022-914FA8641A, FEDORA-2022-3544C7D20E"
},
{
"date": "2022-06-09T22:00:00.000+00:00",
"number": "3",
"summary": "PoC f\u00fcr CVE-2022-23808 aufgenommen"
},
{
"date": "2023-11-26T23:00:00.000+00:00",
"number": "4",
"summary": "Neue Updates von Gentoo aufgenommen"
}
],
"status": "final",
"version": "4"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "Gentoo Linux",
"product": {
"name": "Gentoo Linux",
"product_id": "T012167",
"product_identification_helper": {
"cpe": "cpe:/o:gentoo:linux:-"
}
}
}
],
"category": "vendor",
"name": "Gentoo"
},
{
"branches": [
{
"category": "product_name",
"name": "Open Source phpMyAdmin \u003c 5.1.2",
"product": {
"name": "Open Source phpMyAdmin \u003c 5.1.2",
"product_id": "T021796",
"product_identification_helper": {
"cpe": "cpe:/a:phpmyadmin:phpmyadmin:5.1.2"
}
}
}
],
"category": "vendor",
"name": "Open Source"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2022-23807",
"notes": [
{
"category": "description",
"text": "Es existiert eine Schwachstelle in phpMyAdmin. Ein berechtigter Nutzer kann durch eine Reihe von Aktionen die Zwei-Faktor-Authentifizierung f\u00fcr dieses Konto deaktivieren. Ein authentisierter Angreifer kann diese Schwachstelle ausnutzen, um Sicherheitsvorkehrungen zu umgehen. Zur erfolgreichen Ausnutzung ist eine Benutzeraktion erforderlich."
}
],
"product_status": {
"known_affected": [
"T012167"
]
},
"release_date": "2022-01-23T23:00:00.000+00:00",
"title": "CVE-2022-23807"
},
{
"cve": "CVE-2022-23808",
"notes": [
{
"category": "description",
"text": "In phpMyAdmin existiert eine Cross-Site Scripting Schwachstelle. HTML und Script-Eingaben werden nicht ordnungsgem\u00e4\u00df \u00fcberpr\u00fcft, bevor sie an den Benutzer zur\u00fcckgegeben werden. Ein entfernter anonymer Angreifer kann durch Ausnutzung dieser Schwachstelle beliebigen HTML- und Script-Code durch den Browser des Benutzers im Kontext der betroffenen Seite ausf\u00fchren. Zur erfolgreichen Ausnutzung ist eine Benutzeraktion erforderlich."
}
],
"product_status": {
"known_affected": [
"T012167"
]
},
"release_date": "2022-01-23T23:00:00.000+00:00",
"title": "CVE-2022-23808"
}
]
}
OPENSUSE-SU-2024:11765-1
Vulnerability from csaf_opensuse - Published: 2024-06-15 00:00 - Updated: 2024-06-15 00:00Notes
{
"document": {
"aggregate_severity": {
"namespace": "https://www.suse.com/support/security/rating/",
"text": "moderate"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright 2024 SUSE LLC. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "phpMyAdmin-5.1.2-1.1 on GA media",
"title": "Title of the patch"
},
{
"category": "description",
"text": "These are all security issues fixed in the phpMyAdmin-5.1.2-1.1 package on the GA media of openSUSE Tumbleweed.",
"title": "Description of the patch"
},
{
"category": "details",
"text": "openSUSE-Tumbleweed-2024-11765",
"title": "Patchnames"
},
{
"category": "legal_disclaimer",
"text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).",
"title": "Terms of use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://www.suse.com/support/security/contact/",
"name": "SUSE Product Security Team",
"namespace": "https://www.suse.com/"
},
"references": [
{
"category": "external",
"summary": "SUSE ratings",
"url": "https://www.suse.com/support/security/rating/"
},
{
"category": "self",
"summary": "URL of this CSAF notice",
"url": "https://ftp.suse.com/pub/projects/security/csaf/opensuse-su-2024_11765-1.json"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2022-23807 page",
"url": "https://www.suse.com/security/cve/CVE-2022-23807/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2022-23808 page",
"url": "https://www.suse.com/security/cve/CVE-2022-23808/"
}
],
"title": "phpMyAdmin-5.1.2-1.1 on GA media",
"tracking": {
"current_release_date": "2024-06-15T00:00:00Z",
"generator": {
"date": "2024-06-15T00:00:00Z",
"engine": {
"name": "cve-database.git:bin/generate-csaf.pl",
"version": "1"
}
},
"id": "openSUSE-SU-2024:11765-1",
"initial_release_date": "2024-06-15T00:00:00Z",
"revision_history": [
{
"date": "2024-06-15T00:00:00Z",
"number": "1",
"summary": "Current version"
}
],
"status": "final",
"version": "1"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_version",
"name": "phpMyAdmin-5.1.2-1.1.aarch64",
"product": {
"name": "phpMyAdmin-5.1.2-1.1.aarch64",
"product_id": "phpMyAdmin-5.1.2-1.1.aarch64"
}
},
{
"category": "product_version",
"name": "phpMyAdmin-apache-5.1.2-1.1.aarch64",
"product": {
"name": "phpMyAdmin-apache-5.1.2-1.1.aarch64",
"product_id": "phpMyAdmin-apache-5.1.2-1.1.aarch64"
}
},
{
"category": "product_version",
"name": "phpMyAdmin-lang-5.1.2-1.1.aarch64",
"product": {
"name": "phpMyAdmin-lang-5.1.2-1.1.aarch64",
"product_id": "phpMyAdmin-lang-5.1.2-1.1.aarch64"
}
}
],
"category": "architecture",
"name": "aarch64"
},
{
"branches": [
{
"category": "product_version",
"name": "phpMyAdmin-5.1.2-1.1.ppc64le",
"product": {
"name": "phpMyAdmin-5.1.2-1.1.ppc64le",
"product_id": "phpMyAdmin-5.1.2-1.1.ppc64le"
}
},
{
"category": "product_version",
"name": "phpMyAdmin-apache-5.1.2-1.1.ppc64le",
"product": {
"name": "phpMyAdmin-apache-5.1.2-1.1.ppc64le",
"product_id": "phpMyAdmin-apache-5.1.2-1.1.ppc64le"
}
},
{
"category": "product_version",
"name": "phpMyAdmin-lang-5.1.2-1.1.ppc64le",
"product": {
"name": "phpMyAdmin-lang-5.1.2-1.1.ppc64le",
"product_id": "phpMyAdmin-lang-5.1.2-1.1.ppc64le"
}
}
],
"category": "architecture",
"name": "ppc64le"
},
{
"branches": [
{
"category": "product_version",
"name": "phpMyAdmin-5.1.2-1.1.s390x",
"product": {
"name": "phpMyAdmin-5.1.2-1.1.s390x",
"product_id": "phpMyAdmin-5.1.2-1.1.s390x"
}
},
{
"category": "product_version",
"name": "phpMyAdmin-apache-5.1.2-1.1.s390x",
"product": {
"name": "phpMyAdmin-apache-5.1.2-1.1.s390x",
"product_id": "phpMyAdmin-apache-5.1.2-1.1.s390x"
}
},
{
"category": "product_version",
"name": "phpMyAdmin-lang-5.1.2-1.1.s390x",
"product": {
"name": "phpMyAdmin-lang-5.1.2-1.1.s390x",
"product_id": "phpMyAdmin-lang-5.1.2-1.1.s390x"
}
}
],
"category": "architecture",
"name": "s390x"
},
{
"branches": [
{
"category": "product_version",
"name": "phpMyAdmin-5.1.2-1.1.x86_64",
"product": {
"name": "phpMyAdmin-5.1.2-1.1.x86_64",
"product_id": "phpMyAdmin-5.1.2-1.1.x86_64"
}
},
{
"category": "product_version",
"name": "phpMyAdmin-apache-5.1.2-1.1.x86_64",
"product": {
"name": "phpMyAdmin-apache-5.1.2-1.1.x86_64",
"product_id": "phpMyAdmin-apache-5.1.2-1.1.x86_64"
}
},
{
"category": "product_version",
"name": "phpMyAdmin-lang-5.1.2-1.1.x86_64",
"product": {
"name": "phpMyAdmin-lang-5.1.2-1.1.x86_64",
"product_id": "phpMyAdmin-lang-5.1.2-1.1.x86_64"
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_name",
"name": "openSUSE Tumbleweed",
"product": {
"name": "openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed",
"product_identification_helper": {
"cpe": "cpe:/o:opensuse:tumbleweed"
}
}
}
],
"category": "product_family",
"name": "SUSE Linux Enterprise"
}
],
"category": "vendor",
"name": "SUSE"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "phpMyAdmin-5.1.2-1.1.aarch64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:phpMyAdmin-5.1.2-1.1.aarch64"
},
"product_reference": "phpMyAdmin-5.1.2-1.1.aarch64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "phpMyAdmin-5.1.2-1.1.ppc64le as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:phpMyAdmin-5.1.2-1.1.ppc64le"
},
"product_reference": "phpMyAdmin-5.1.2-1.1.ppc64le",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "phpMyAdmin-5.1.2-1.1.s390x as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:phpMyAdmin-5.1.2-1.1.s390x"
},
"product_reference": "phpMyAdmin-5.1.2-1.1.s390x",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "phpMyAdmin-5.1.2-1.1.x86_64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:phpMyAdmin-5.1.2-1.1.x86_64"
},
"product_reference": "phpMyAdmin-5.1.2-1.1.x86_64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "phpMyAdmin-apache-5.1.2-1.1.aarch64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:phpMyAdmin-apache-5.1.2-1.1.aarch64"
},
"product_reference": "phpMyAdmin-apache-5.1.2-1.1.aarch64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "phpMyAdmin-apache-5.1.2-1.1.ppc64le as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:phpMyAdmin-apache-5.1.2-1.1.ppc64le"
},
"product_reference": "phpMyAdmin-apache-5.1.2-1.1.ppc64le",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "phpMyAdmin-apache-5.1.2-1.1.s390x as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:phpMyAdmin-apache-5.1.2-1.1.s390x"
},
"product_reference": "phpMyAdmin-apache-5.1.2-1.1.s390x",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "phpMyAdmin-apache-5.1.2-1.1.x86_64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:phpMyAdmin-apache-5.1.2-1.1.x86_64"
},
"product_reference": "phpMyAdmin-apache-5.1.2-1.1.x86_64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "phpMyAdmin-lang-5.1.2-1.1.aarch64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:phpMyAdmin-lang-5.1.2-1.1.aarch64"
},
"product_reference": "phpMyAdmin-lang-5.1.2-1.1.aarch64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "phpMyAdmin-lang-5.1.2-1.1.ppc64le as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:phpMyAdmin-lang-5.1.2-1.1.ppc64le"
},
"product_reference": "phpMyAdmin-lang-5.1.2-1.1.ppc64le",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "phpMyAdmin-lang-5.1.2-1.1.s390x as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:phpMyAdmin-lang-5.1.2-1.1.s390x"
},
"product_reference": "phpMyAdmin-lang-5.1.2-1.1.s390x",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "phpMyAdmin-lang-5.1.2-1.1.x86_64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:phpMyAdmin-lang-5.1.2-1.1.x86_64"
},
"product_reference": "phpMyAdmin-lang-5.1.2-1.1.x86_64",
"relates_to_product_reference": "openSUSE Tumbleweed"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2022-23807",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2022-23807"
}
],
"notes": [
{
"category": "general",
"text": "An issue was discovered in phpMyAdmin 4.9 before 4.9.8 and 5.1 before 5.1.2. A valid user who is already authenticated to phpMyAdmin can manipulate their account to bypass two-factor authentication for future login instances.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:phpMyAdmin-5.1.2-1.1.aarch64",
"openSUSE Tumbleweed:phpMyAdmin-5.1.2-1.1.ppc64le",
"openSUSE Tumbleweed:phpMyAdmin-5.1.2-1.1.s390x",
"openSUSE Tumbleweed:phpMyAdmin-5.1.2-1.1.x86_64",
"openSUSE Tumbleweed:phpMyAdmin-apache-5.1.2-1.1.aarch64",
"openSUSE Tumbleweed:phpMyAdmin-apache-5.1.2-1.1.ppc64le",
"openSUSE Tumbleweed:phpMyAdmin-apache-5.1.2-1.1.s390x",
"openSUSE Tumbleweed:phpMyAdmin-apache-5.1.2-1.1.x86_64",
"openSUSE Tumbleweed:phpMyAdmin-lang-5.1.2-1.1.aarch64",
"openSUSE Tumbleweed:phpMyAdmin-lang-5.1.2-1.1.ppc64le",
"openSUSE Tumbleweed:phpMyAdmin-lang-5.1.2-1.1.s390x",
"openSUSE Tumbleweed:phpMyAdmin-lang-5.1.2-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2022-23807",
"url": "https://www.suse.com/security/cve/CVE-2022-23807"
},
{
"category": "external",
"summary": "SUSE Bug 1195017 for CVE-2022-23807",
"url": "https://bugzilla.suse.com/1195017"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:phpMyAdmin-5.1.2-1.1.aarch64",
"openSUSE Tumbleweed:phpMyAdmin-5.1.2-1.1.ppc64le",
"openSUSE Tumbleweed:phpMyAdmin-5.1.2-1.1.s390x",
"openSUSE Tumbleweed:phpMyAdmin-5.1.2-1.1.x86_64",
"openSUSE Tumbleweed:phpMyAdmin-apache-5.1.2-1.1.aarch64",
"openSUSE Tumbleweed:phpMyAdmin-apache-5.1.2-1.1.ppc64le",
"openSUSE Tumbleweed:phpMyAdmin-apache-5.1.2-1.1.s390x",
"openSUSE Tumbleweed:phpMyAdmin-apache-5.1.2-1.1.x86_64",
"openSUSE Tumbleweed:phpMyAdmin-lang-5.1.2-1.1.aarch64",
"openSUSE Tumbleweed:phpMyAdmin-lang-5.1.2-1.1.ppc64le",
"openSUSE Tumbleweed:phpMyAdmin-lang-5.1.2-1.1.s390x",
"openSUSE Tumbleweed:phpMyAdmin-lang-5.1.2-1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.3,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:phpMyAdmin-5.1.2-1.1.aarch64",
"openSUSE Tumbleweed:phpMyAdmin-5.1.2-1.1.ppc64le",
"openSUSE Tumbleweed:phpMyAdmin-5.1.2-1.1.s390x",
"openSUSE Tumbleweed:phpMyAdmin-5.1.2-1.1.x86_64",
"openSUSE Tumbleweed:phpMyAdmin-apache-5.1.2-1.1.aarch64",
"openSUSE Tumbleweed:phpMyAdmin-apache-5.1.2-1.1.ppc64le",
"openSUSE Tumbleweed:phpMyAdmin-apache-5.1.2-1.1.s390x",
"openSUSE Tumbleweed:phpMyAdmin-apache-5.1.2-1.1.x86_64",
"openSUSE Tumbleweed:phpMyAdmin-lang-5.1.2-1.1.aarch64",
"openSUSE Tumbleweed:phpMyAdmin-lang-5.1.2-1.1.ppc64le",
"openSUSE Tumbleweed:phpMyAdmin-lang-5.1.2-1.1.s390x",
"openSUSE Tumbleweed:phpMyAdmin-lang-5.1.2-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2022-23807"
},
{
"cve": "CVE-2022-23808",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2022-23808"
}
],
"notes": [
{
"category": "general",
"text": "An issue was discovered in phpMyAdmin 5.1 before 5.1.2. An attacker can inject malicious code into aspects of the setup script, which can allow XSS or HTML injection.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:phpMyAdmin-5.1.2-1.1.aarch64",
"openSUSE Tumbleweed:phpMyAdmin-5.1.2-1.1.ppc64le",
"openSUSE Tumbleweed:phpMyAdmin-5.1.2-1.1.s390x",
"openSUSE Tumbleweed:phpMyAdmin-5.1.2-1.1.x86_64",
"openSUSE Tumbleweed:phpMyAdmin-apache-5.1.2-1.1.aarch64",
"openSUSE Tumbleweed:phpMyAdmin-apache-5.1.2-1.1.ppc64le",
"openSUSE Tumbleweed:phpMyAdmin-apache-5.1.2-1.1.s390x",
"openSUSE Tumbleweed:phpMyAdmin-apache-5.1.2-1.1.x86_64",
"openSUSE Tumbleweed:phpMyAdmin-lang-5.1.2-1.1.aarch64",
"openSUSE Tumbleweed:phpMyAdmin-lang-5.1.2-1.1.ppc64le",
"openSUSE Tumbleweed:phpMyAdmin-lang-5.1.2-1.1.s390x",
"openSUSE Tumbleweed:phpMyAdmin-lang-5.1.2-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2022-23808",
"url": "https://www.suse.com/security/cve/CVE-2022-23808"
},
{
"category": "external",
"summary": "SUSE Bug 1195018 for CVE-2022-23808",
"url": "https://bugzilla.suse.com/1195018"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:phpMyAdmin-5.1.2-1.1.aarch64",
"openSUSE Tumbleweed:phpMyAdmin-5.1.2-1.1.ppc64le",
"openSUSE Tumbleweed:phpMyAdmin-5.1.2-1.1.s390x",
"openSUSE Tumbleweed:phpMyAdmin-5.1.2-1.1.x86_64",
"openSUSE Tumbleweed:phpMyAdmin-apache-5.1.2-1.1.aarch64",
"openSUSE Tumbleweed:phpMyAdmin-apache-5.1.2-1.1.ppc64le",
"openSUSE Tumbleweed:phpMyAdmin-apache-5.1.2-1.1.s390x",
"openSUSE Tumbleweed:phpMyAdmin-apache-5.1.2-1.1.x86_64",
"openSUSE Tumbleweed:phpMyAdmin-lang-5.1.2-1.1.aarch64",
"openSUSE Tumbleweed:phpMyAdmin-lang-5.1.2-1.1.ppc64le",
"openSUSE Tumbleweed:phpMyAdmin-lang-5.1.2-1.1.s390x",
"openSUSE Tumbleweed:phpMyAdmin-lang-5.1.2-1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.1,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:phpMyAdmin-5.1.2-1.1.aarch64",
"openSUSE Tumbleweed:phpMyAdmin-5.1.2-1.1.ppc64le",
"openSUSE Tumbleweed:phpMyAdmin-5.1.2-1.1.s390x",
"openSUSE Tumbleweed:phpMyAdmin-5.1.2-1.1.x86_64",
"openSUSE Tumbleweed:phpMyAdmin-apache-5.1.2-1.1.aarch64",
"openSUSE Tumbleweed:phpMyAdmin-apache-5.1.2-1.1.ppc64le",
"openSUSE Tumbleweed:phpMyAdmin-apache-5.1.2-1.1.s390x",
"openSUSE Tumbleweed:phpMyAdmin-apache-5.1.2-1.1.x86_64",
"openSUSE Tumbleweed:phpMyAdmin-lang-5.1.2-1.1.aarch64",
"openSUSE Tumbleweed:phpMyAdmin-lang-5.1.2-1.1.ppc64le",
"openSUSE Tumbleweed:phpMyAdmin-lang-5.1.2-1.1.s390x",
"openSUSE Tumbleweed:phpMyAdmin-lang-5.1.2-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2022-23808"
}
]
}
OPENSUSE-SU-2023:0047-1
Vulnerability from csaf_opensuse - Published: 2023-02-15 10:21 - Updated: 2023-02-15 10:21Notes
{
"document": {
"aggregate_severity": {
"namespace": "https://www.suse.com/support/security/rating/",
"text": "important"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright 2024 SUSE LLC. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "Security update for phpMyAdmin",
"title": "Title of the patch"
},
{
"category": "description",
"text": "This update for phpMyAdmin fixes the following issues:\n\nphpMyAdmin was updated to 5.2.1\n\nThis is a security and bufix release.\n\n* Security:\n\n - Fix (PMASA-2023-01, CWE-661, boo#1208186, CVE-2023-25727) \n Fix an XSS attack through the drag-and-drop upload feature.\n\n* Bugfixes:\n\n - issue #17522 Fix case where the routes cache file is invalid\n - issue #17506 Fix error when configuring 2FA without XMLWriter or Imagick\n - issue Fix blank page when some error occurs\n - issue #17519 Fix Export pages not working in certain conditions\n - issue #17496 Fix error in table operation page when partitions are broken\n - issue #17386 Fix system memory and system swap values on Windows\n - issue #17517 Fix Database Server panel not getting hidden by ShowServerInfo configuration directive\n - issue #17271 Fix database names not showing on Processes tab\n - issue #17424 Fix export limit size calculation\n - issue #17366 Fix refresh rate popup on Monitor page\n - issue #17577 Fix monitor charts size on RTL languages\n - issue #17121 Fix password_hash function incorrectly adding single quotes to password before hashing\n - issue #17586 Fix statistics not showing for empty databases\n - issue #17592 Clicking on the New index link on the sidebar does not throw an error anymore\n - issue #17584 It\u0027s now possible to browse a database that includes two % in its name\n - issue Fix PHP 8.2 deprecated string interpolation syntax\n - issue Some languages are now correctly detected from the HTTP header\n - issue #17617 Sorting is correctly remembered when $cfg[\u0027RememberSorting\u0027] is true\n - issue #17593 Table filtering now works when action buttons are on the right side of the row\n - issue #17388 Find and Replace using regex now makes a valid query if no matching result set found\n - issue #17551 Enum/Set editor will not fail to open when creating a new column\n - issue #17659 Fix error when a database group is named tables, views, functions, procedures or events\n - issue #17673 Allow empty values to be inserted into columns\n - issue #17620 Fix error handling at phpMyAdmin startup for the JS SQL console\n - issue Fixed debug queries console broken UI for query time and group count\n - issue Fixed escaping of SQL query and errors for the debug console\n - issue Fix console toolbar UI when the bookmark feature is disabled and sql debug is enabled\n - issue #17543 Fix JS error on saving a new designer page\n - issue #17546 Fix JS error after using save as and open page operation on the designer\n - issue Fix PHP warning on GIS visualization when there is only one GIS column\n - issue #17728 Some select HTML tags will now have the correct UI style\n - issue #17734 PHP deprecations will only be shown when in a development environment\n - issue #17369 Fix server error when blowfish_secret is not exactly 32 bytes long\n - issue #17736 Add utf8mb3 as an alias of utf8 on the charset description page\n - issue #16418 Fix FAQ 1.44 about manually removing vendor folders\n - issue #12359 Setup page now sends the Content-Security-Policy headers\n - issue #17747 The Column Visibility Toggle will not be hidden by other elements\n - issue #17756 Edit/Copy/Delete row now works when using GROUP BY\n - issue #17248 Support the UUID data type for MariaDB \u003e= 10.7\n - issue #17656 Fix replace/change/set table prefix is not working\n - issue Fix monitor page filter queries only filtering the first row\n - issue Fix \u0027Link not found!\u0027 on foreign columns for tables having no char column to show\n - issue #17390 Fix \u0027Create view\u0027 modal doesn\u0027t show on results and empty results\n - issue #17772 Fix wrong styles for add button from central columns\n - issue #17389 Fix HTML disappears when exporting settings to browser\u0027s storage\n - issue #17166 Fix \u0027Warning: #1287 \u0027X\u0027 is deprecated [...] Please use ST_X instead.\u0027 on search page\n - issue Use jquery-migrate.min.js (14KB) instead of jquery-migrate.min.js (31KB)\n - issue #17842 Use jquery.validate.min.js (24 KB) instead of jquery.validate.js (50 KB)\n - issue #17281 Fix links to databases for information_schema.SCHEMATA\n - issue #17553 Fix Metro theme unreadable links above navigation tree\n - issue #17553 Metro theme UI fixes and improvements\n - issue #17553 Fix Metro theme login form with\n - issue #16042 Exported gzip file of database has first ~73 kB uncompressed and rest is gzip compressed in Firefox\n - issue #17705 Fix inline SQL query edit FK checkbox preventing submit buttons from working\n - issue #17777 Fix Uncaught TypeError: Cannot read properties of null (reading \u0027inline\u0027) on datepickers when re-opened\n - issue Fix Original theme buttons style and login form width\n - issue #17892 Fix closing index edit modal and reopening causes it to fire twice\n - issue #17606 Fix preview SQL modal not working inside \u0027Add Index\u0027 modal\n - issue Fix PHP error on adding new column on create table form\n - issue #17482 Default to \u0027Full texts\u0027 when running explain statements\n - issue Fixed Chrome scrolling performance issue on a textarea of an \u0027export as text\u0027 page\n - issue #17703 Fix datepicker appears on all fields, not just date\n - issue Fix space in the tree line when a DB is expanded\n - issue #17340 Fix \u0027New Table\u0027 page -\u003e \u0027VIRTUAL\u0027 attribute is lost when adding a new column\n - issue #17446 Fix missing option for STORED virtual column on MySQL and PERSISTENT is not supported on MySQL\n - issue #17446 Lower the check for virtual columns to MySQL\u003e=5.7.6 nothing is supported on 5.7.5\n - issue Fix column names option for CSV Export\n - issue #17177 Fix preview SQL when reordering columns doesn\u0027t work on move columns\n - issue #15887 Fixed DROP TABLE errors ignored on multi table select for DROP\n - issue #17944 Fix unable to create a view from tree view button\n - issue #17927 Fix key navigation between select inputs (drop an old Firefox workaround)\n - issue #17967 Fix missing icon for collapse all button\n - issue #18006 Fixed UUID columns can\u0027t be moved\n - issue Add `spellcheck=\u0027false\u0027` to all password fields and some text fields to avoid spell-jacking data leaks\n - issue Remove non working \u0027Analyze Explain at MariaDB.org\u0027 button (MariaDB stopped this service)\n - issue #17229 Add support for Web Authentication API because Chrome removed support for the U2F API\n - issue #18019 Fix \u0027Call to a member function fetchAssoc() on bool\u0027 with SQL mode ONLY_FULL_GROUP_BY on monitor search logs\n - issue Add back UUID and UUID_SHORT to functions on MySQL and all MariaDB versions\n - issue #17398 Fix clicking on JSON columns triggers update query\n - issue Fix silent JSON parse error on upload progress\n - issue #17833 Fix \u0027Add Parameter\u0027 button not working for Add Routine Screen\n - issue #17365 Fixed \u0027Uncaught Error: regexp too big\u0027 on server status variables page\n\nUpdate to 5.2.0\n\n* Bugfix\n\n - issue #16521 Upgrade Bootstrap to version 5\n - issue #16521 Drop support for Internet Explorer and others\n - issue Upgrade to shapefile 3\n - issue #16555 Bump minimum PHP version to 7.2\n - issue Remove the phpseclib dependency\n - issue Upgrade Symfony components to version 5.2\n - issue Upgrade to Motranslator 4\n - issue #16005 Improve the performance of the Export logic\n - issue #16829 Add NOT LIKE %...% operator to Table search\n - issue #16845 Fixed some links not passing through url.php\n - issue #16382 Remove apc upload progress method (all upload progress code was removed from the PHP extension)\n - issue #16974 Replace zxcvbn by zxcvbn-ts\n - issue #15691 Disable the last column checkbox in the column list dropdown instead of not allowing un-check\n - issue #16138 Ignore the length of integer types and show a warning on MySQL \u003e= 8.0.18\n - issue Add support for the Mroonga engine\n - issue Double click column name to directly copy to clipboard\n - issue #16425 Add DELETE FROM table on table operations page\n - issue #16482 Add a select all link for table-specific privileges\n - issue #14276 Add support for account locking\n - issue #17143 Use composer/ca-bundle to manage the CA cert file\n - issue #17143 Require the openssl PHP extension\n - issue #17171 Remove the printview.css file from themes\n - issue #17203 Redesign the export and the import pages\n - issue #16197 Replace the master/slave terminology\n - issue #17257 Replace libraries/vendor_config.php constants with an array\n - issue Add the Bootstrap theme\n - issue #17499 Remove stickyfilljs JavaScript dependency\n\nUpdate to 5.1.3\n\nThis is a security and bufix release.\n\n* Security\n\n - Fix for boo#1197036 (CVE-2022-0813)\n - Fix for path disclosure under certain server configurations\n (if display_errors is on, for instance)\n\n* Bugfix\n\n - issue #17308 Fix broken pagination links in the navigation sidebar\n - issue #17331 Fix MariaDB has no support for system variable \u0027disabled_storage_engines\u0027\n - issue #17315 Fix unsupported operand types in Results.php when running \u0027SHOW PROCESSLIST\u0027 SQL query\n - issue #17288 Fixed importing browser settings question box after login when having no pmadb\n - issue #17288 Fix \u0027First day of calendar\u0027 user override has no effect\n - issue #17239 Fixed repeating headers are not working\n - issue #17298 Fixed import of email-adresses or links from ODS results in empty contents\n - issue #17344 Fixed a type error on ODS import with non string values\n - issue #17239 Fixed header row show/hide columns buttons on each line after hover are shown on each row\n\nUpdate to 5.1.2\n\nThis is a security and bufix release.\n\n* Security\n\n - Fix boo#1195017 (CVE-2022-23807, PMASA-2022-1, CWE-661) \n Two factor authentication bypass\n - Fix boo#1195018 (CVE-2022-23808, PMASA-2022-2, CWE-661)\n Multiple XSS and HTML injection attacks in setup script\n\n* Bugfixes\n\n - Revert a changed to $cfg[\u0027CharTextareaRows\u0027] allow values\n less than 7\n - Fix encoding of enum and set values on edit value\n - Fixed possible \u0027Undefined index: clause_is_unique\u0027 error\n - Fixed some situations where a user is logged out when working\n with more than one server\n - Fixed a problem with assigning privileges to a user using the\n multiselect list when the database name has an underscore\n - Enable cookie parameter \u0027SameSite\u0027 when the PHP version\n is 7.3 or newer\n - Correctly handle the removal of \u0027innodb_file_format\u0027 in\n MariaDB and MySQL\n\n",
"title": "Description of the patch"
},
{
"category": "details",
"text": "openSUSE-2023-47",
"title": "Patchnames"
},
{
"category": "legal_disclaimer",
"text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).",
"title": "Terms of use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://www.suse.com/support/security/contact/",
"name": "SUSE Product Security Team",
"namespace": "https://www.suse.com/"
},
"references": [
{
"category": "external",
"summary": "SUSE ratings",
"url": "https://www.suse.com/support/security/rating/"
},
{
"category": "self",
"summary": "URL of this CSAF notice",
"url": "https://ftp.suse.com/pub/projects/security/csaf/opensuse-su-2023_0047-1.json"
},
{
"category": "self",
"summary": "URL for openSUSE-SU-2023:0047-1",
"url": "https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/VQ5VVS2CGDQ32RHYLQQZFFFADPEZO6KM/"
},
{
"category": "self",
"summary": "E-Mail link for openSUSE-SU-2023:0047-1",
"url": "https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/VQ5VVS2CGDQ32RHYLQQZFFFADPEZO6KM/"
},
{
"category": "self",
"summary": "SUSE Bug 1195017",
"url": "https://bugzilla.suse.com/1195017"
},
{
"category": "self",
"summary": "SUSE Bug 1195018",
"url": "https://bugzilla.suse.com/1195018"
},
{
"category": "self",
"summary": "SUSE Bug 1197036",
"url": "https://bugzilla.suse.com/1197036"
},
{
"category": "self",
"summary": "SUSE Bug 1208186",
"url": "https://bugzilla.suse.com/1208186"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2022-0813 page",
"url": "https://www.suse.com/security/cve/CVE-2022-0813/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2022-23807 page",
"url": "https://www.suse.com/security/cve/CVE-2022-23807/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2022-23808 page",
"url": "https://www.suse.com/security/cve/CVE-2022-23808/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2023-25727 page",
"url": "https://www.suse.com/security/cve/CVE-2023-25727/"
}
],
"title": "Security update for phpMyAdmin",
"tracking": {
"current_release_date": "2023-02-15T10:21:02Z",
"generator": {
"date": "2023-02-15T10:21:02Z",
"engine": {
"name": "cve-database.git:bin/generate-csaf.pl",
"version": "1"
}
},
"id": "openSUSE-SU-2023:0047-1",
"initial_release_date": "2023-02-15T10:21:02Z",
"revision_history": [
{
"date": "2023-02-15T10:21:02Z",
"number": "1",
"summary": "Current version"
}
],
"status": "final",
"version": "1"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_version",
"name": "phpMyAdmin-5.2.1-bp154.2.3.1.noarch",
"product": {
"name": "phpMyAdmin-5.2.1-bp154.2.3.1.noarch",
"product_id": "phpMyAdmin-5.2.1-bp154.2.3.1.noarch"
}
},
{
"category": "product_version",
"name": "phpMyAdmin-apache-5.2.1-bp154.2.3.1.noarch",
"product": {
"name": "phpMyAdmin-apache-5.2.1-bp154.2.3.1.noarch",
"product_id": "phpMyAdmin-apache-5.2.1-bp154.2.3.1.noarch"
}
},
{
"category": "product_version",
"name": "phpMyAdmin-lang-5.2.1-bp154.2.3.1.noarch",
"product": {
"name": "phpMyAdmin-lang-5.2.1-bp154.2.3.1.noarch",
"product_id": "phpMyAdmin-lang-5.2.1-bp154.2.3.1.noarch"
}
}
],
"category": "architecture",
"name": "noarch"
},
{
"branches": [
{
"category": "product_name",
"name": "SUSE Package Hub 15 SP4",
"product": {
"name": "SUSE Package Hub 15 SP4",
"product_id": "SUSE Package Hub 15 SP4"
}
},
{
"category": "product_name",
"name": "openSUSE Leap 15.4",
"product": {
"name": "openSUSE Leap 15.4",
"product_id": "openSUSE Leap 15.4",
"product_identification_helper": {
"cpe": "cpe:/o:opensuse:leap:15.4"
}
}
}
],
"category": "product_family",
"name": "SUSE Linux Enterprise"
}
],
"category": "vendor",
"name": "SUSE"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "phpMyAdmin-5.2.1-bp154.2.3.1.noarch as component of SUSE Package Hub 15 SP4",
"product_id": "SUSE Package Hub 15 SP4:phpMyAdmin-5.2.1-bp154.2.3.1.noarch"
},
"product_reference": "phpMyAdmin-5.2.1-bp154.2.3.1.noarch",
"relates_to_product_reference": "SUSE Package Hub 15 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "phpMyAdmin-apache-5.2.1-bp154.2.3.1.noarch as component of SUSE Package Hub 15 SP4",
"product_id": "SUSE Package Hub 15 SP4:phpMyAdmin-apache-5.2.1-bp154.2.3.1.noarch"
},
"product_reference": "phpMyAdmin-apache-5.2.1-bp154.2.3.1.noarch",
"relates_to_product_reference": "SUSE Package Hub 15 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "phpMyAdmin-lang-5.2.1-bp154.2.3.1.noarch as component of SUSE Package Hub 15 SP4",
"product_id": "SUSE Package Hub 15 SP4:phpMyAdmin-lang-5.2.1-bp154.2.3.1.noarch"
},
"product_reference": "phpMyAdmin-lang-5.2.1-bp154.2.3.1.noarch",
"relates_to_product_reference": "SUSE Package Hub 15 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "phpMyAdmin-5.2.1-bp154.2.3.1.noarch as component of openSUSE Leap 15.4",
"product_id": "openSUSE Leap 15.4:phpMyAdmin-5.2.1-bp154.2.3.1.noarch"
},
"product_reference": "phpMyAdmin-5.2.1-bp154.2.3.1.noarch",
"relates_to_product_reference": "openSUSE Leap 15.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "phpMyAdmin-apache-5.2.1-bp154.2.3.1.noarch as component of openSUSE Leap 15.4",
"product_id": "openSUSE Leap 15.4:phpMyAdmin-apache-5.2.1-bp154.2.3.1.noarch"
},
"product_reference": "phpMyAdmin-apache-5.2.1-bp154.2.3.1.noarch",
"relates_to_product_reference": "openSUSE Leap 15.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "phpMyAdmin-lang-5.2.1-bp154.2.3.1.noarch as component of openSUSE Leap 15.4",
"product_id": "openSUSE Leap 15.4:phpMyAdmin-lang-5.2.1-bp154.2.3.1.noarch"
},
"product_reference": "phpMyAdmin-lang-5.2.1-bp154.2.3.1.noarch",
"relates_to_product_reference": "openSUSE Leap 15.4"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2022-0813",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2022-0813"
}
],
"notes": [
{
"category": "general",
"text": "PhpMyAdmin 5.1.1 and before allows an attacker to retrieve potentially sensitive information by creating invalid requests. This affects the lang parameter, the pma_parameter, and the cookie section.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Package Hub 15 SP4:phpMyAdmin-5.2.1-bp154.2.3.1.noarch",
"SUSE Package Hub 15 SP4:phpMyAdmin-apache-5.2.1-bp154.2.3.1.noarch",
"SUSE Package Hub 15 SP4:phpMyAdmin-lang-5.2.1-bp154.2.3.1.noarch",
"openSUSE Leap 15.4:phpMyAdmin-5.2.1-bp154.2.3.1.noarch",
"openSUSE Leap 15.4:phpMyAdmin-apache-5.2.1-bp154.2.3.1.noarch",
"openSUSE Leap 15.4:phpMyAdmin-lang-5.2.1-bp154.2.3.1.noarch"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2022-0813",
"url": "https://www.suse.com/security/cve/CVE-2022-0813"
},
{
"category": "external",
"summary": "SUSE Bug 1197036 for CVE-2022-0813",
"url": "https://bugzilla.suse.com/1197036"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Package Hub 15 SP4:phpMyAdmin-5.2.1-bp154.2.3.1.noarch",
"SUSE Package Hub 15 SP4:phpMyAdmin-apache-5.2.1-bp154.2.3.1.noarch",
"SUSE Package Hub 15 SP4:phpMyAdmin-lang-5.2.1-bp154.2.3.1.noarch",
"openSUSE Leap 15.4:phpMyAdmin-5.2.1-bp154.2.3.1.noarch",
"openSUSE Leap 15.4:phpMyAdmin-apache-5.2.1-bp154.2.3.1.noarch",
"openSUSE Leap 15.4:phpMyAdmin-lang-5.2.1-bp154.2.3.1.noarch"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.3,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N",
"version": "3.1"
},
"products": [
"SUSE Package Hub 15 SP4:phpMyAdmin-5.2.1-bp154.2.3.1.noarch",
"SUSE Package Hub 15 SP4:phpMyAdmin-apache-5.2.1-bp154.2.3.1.noarch",
"SUSE Package Hub 15 SP4:phpMyAdmin-lang-5.2.1-bp154.2.3.1.noarch",
"openSUSE Leap 15.4:phpMyAdmin-5.2.1-bp154.2.3.1.noarch",
"openSUSE Leap 15.4:phpMyAdmin-apache-5.2.1-bp154.2.3.1.noarch",
"openSUSE Leap 15.4:phpMyAdmin-lang-5.2.1-bp154.2.3.1.noarch"
]
}
],
"threats": [
{
"category": "impact",
"date": "2023-02-15T10:21:02Z",
"details": "moderate"
}
],
"title": "CVE-2022-0813"
},
{
"cve": "CVE-2022-23807",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2022-23807"
}
],
"notes": [
{
"category": "general",
"text": "An issue was discovered in phpMyAdmin 4.9 before 4.9.8 and 5.1 before 5.1.2. A valid user who is already authenticated to phpMyAdmin can manipulate their account to bypass two-factor authentication for future login instances.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Package Hub 15 SP4:phpMyAdmin-5.2.1-bp154.2.3.1.noarch",
"SUSE Package Hub 15 SP4:phpMyAdmin-apache-5.2.1-bp154.2.3.1.noarch",
"SUSE Package Hub 15 SP4:phpMyAdmin-lang-5.2.1-bp154.2.3.1.noarch",
"openSUSE Leap 15.4:phpMyAdmin-5.2.1-bp154.2.3.1.noarch",
"openSUSE Leap 15.4:phpMyAdmin-apache-5.2.1-bp154.2.3.1.noarch",
"openSUSE Leap 15.4:phpMyAdmin-lang-5.2.1-bp154.2.3.1.noarch"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2022-23807",
"url": "https://www.suse.com/security/cve/CVE-2022-23807"
},
{
"category": "external",
"summary": "SUSE Bug 1195017 for CVE-2022-23807",
"url": "https://bugzilla.suse.com/1195017"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Package Hub 15 SP4:phpMyAdmin-5.2.1-bp154.2.3.1.noarch",
"SUSE Package Hub 15 SP4:phpMyAdmin-apache-5.2.1-bp154.2.3.1.noarch",
"SUSE Package Hub 15 SP4:phpMyAdmin-lang-5.2.1-bp154.2.3.1.noarch",
"openSUSE Leap 15.4:phpMyAdmin-5.2.1-bp154.2.3.1.noarch",
"openSUSE Leap 15.4:phpMyAdmin-apache-5.2.1-bp154.2.3.1.noarch",
"openSUSE Leap 15.4:phpMyAdmin-lang-5.2.1-bp154.2.3.1.noarch"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.3,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N",
"version": "3.1"
},
"products": [
"SUSE Package Hub 15 SP4:phpMyAdmin-5.2.1-bp154.2.3.1.noarch",
"SUSE Package Hub 15 SP4:phpMyAdmin-apache-5.2.1-bp154.2.3.1.noarch",
"SUSE Package Hub 15 SP4:phpMyAdmin-lang-5.2.1-bp154.2.3.1.noarch",
"openSUSE Leap 15.4:phpMyAdmin-5.2.1-bp154.2.3.1.noarch",
"openSUSE Leap 15.4:phpMyAdmin-apache-5.2.1-bp154.2.3.1.noarch",
"openSUSE Leap 15.4:phpMyAdmin-lang-5.2.1-bp154.2.3.1.noarch"
]
}
],
"threats": [
{
"category": "impact",
"date": "2023-02-15T10:21:02Z",
"details": "moderate"
}
],
"title": "CVE-2022-23807"
},
{
"cve": "CVE-2022-23808",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2022-23808"
}
],
"notes": [
{
"category": "general",
"text": "An issue was discovered in phpMyAdmin 5.1 before 5.1.2. An attacker can inject malicious code into aspects of the setup script, which can allow XSS or HTML injection.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Package Hub 15 SP4:phpMyAdmin-5.2.1-bp154.2.3.1.noarch",
"SUSE Package Hub 15 SP4:phpMyAdmin-apache-5.2.1-bp154.2.3.1.noarch",
"SUSE Package Hub 15 SP4:phpMyAdmin-lang-5.2.1-bp154.2.3.1.noarch",
"openSUSE Leap 15.4:phpMyAdmin-5.2.1-bp154.2.3.1.noarch",
"openSUSE Leap 15.4:phpMyAdmin-apache-5.2.1-bp154.2.3.1.noarch",
"openSUSE Leap 15.4:phpMyAdmin-lang-5.2.1-bp154.2.3.1.noarch"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2022-23808",
"url": "https://www.suse.com/security/cve/CVE-2022-23808"
},
{
"category": "external",
"summary": "SUSE Bug 1195018 for CVE-2022-23808",
"url": "https://bugzilla.suse.com/1195018"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Package Hub 15 SP4:phpMyAdmin-5.2.1-bp154.2.3.1.noarch",
"SUSE Package Hub 15 SP4:phpMyAdmin-apache-5.2.1-bp154.2.3.1.noarch",
"SUSE Package Hub 15 SP4:phpMyAdmin-lang-5.2.1-bp154.2.3.1.noarch",
"openSUSE Leap 15.4:phpMyAdmin-5.2.1-bp154.2.3.1.noarch",
"openSUSE Leap 15.4:phpMyAdmin-apache-5.2.1-bp154.2.3.1.noarch",
"openSUSE Leap 15.4:phpMyAdmin-lang-5.2.1-bp154.2.3.1.noarch"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.1,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N",
"version": "3.1"
},
"products": [
"SUSE Package Hub 15 SP4:phpMyAdmin-5.2.1-bp154.2.3.1.noarch",
"SUSE Package Hub 15 SP4:phpMyAdmin-apache-5.2.1-bp154.2.3.1.noarch",
"SUSE Package Hub 15 SP4:phpMyAdmin-lang-5.2.1-bp154.2.3.1.noarch",
"openSUSE Leap 15.4:phpMyAdmin-5.2.1-bp154.2.3.1.noarch",
"openSUSE Leap 15.4:phpMyAdmin-apache-5.2.1-bp154.2.3.1.noarch",
"openSUSE Leap 15.4:phpMyAdmin-lang-5.2.1-bp154.2.3.1.noarch"
]
}
],
"threats": [
{
"category": "impact",
"date": "2023-02-15T10:21:02Z",
"details": "moderate"
}
],
"title": "CVE-2022-23808"
},
{
"cve": "CVE-2023-25727",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2023-25727"
}
],
"notes": [
{
"category": "general",
"text": "In phpMyAdmin before 4.9.11 and 5.x before 5.2.1, an authenticated user can trigger XSS by uploading a crafted .sql file through the drag-and-drop interface.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Package Hub 15 SP4:phpMyAdmin-5.2.1-bp154.2.3.1.noarch",
"SUSE Package Hub 15 SP4:phpMyAdmin-apache-5.2.1-bp154.2.3.1.noarch",
"SUSE Package Hub 15 SP4:phpMyAdmin-lang-5.2.1-bp154.2.3.1.noarch",
"openSUSE Leap 15.4:phpMyAdmin-5.2.1-bp154.2.3.1.noarch",
"openSUSE Leap 15.4:phpMyAdmin-apache-5.2.1-bp154.2.3.1.noarch",
"openSUSE Leap 15.4:phpMyAdmin-lang-5.2.1-bp154.2.3.1.noarch"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2023-25727",
"url": "https://www.suse.com/security/cve/CVE-2023-25727"
},
{
"category": "external",
"summary": "SUSE Bug 1208186 for CVE-2023-25727",
"url": "https://bugzilla.suse.com/1208186"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Package Hub 15 SP4:phpMyAdmin-5.2.1-bp154.2.3.1.noarch",
"SUSE Package Hub 15 SP4:phpMyAdmin-apache-5.2.1-bp154.2.3.1.noarch",
"SUSE Package Hub 15 SP4:phpMyAdmin-lang-5.2.1-bp154.2.3.1.noarch",
"openSUSE Leap 15.4:phpMyAdmin-5.2.1-bp154.2.3.1.noarch",
"openSUSE Leap 15.4:phpMyAdmin-apache-5.2.1-bp154.2.3.1.noarch",
"openSUSE Leap 15.4:phpMyAdmin-lang-5.2.1-bp154.2.3.1.noarch"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.4,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N",
"version": "3.1"
},
"products": [
"SUSE Package Hub 15 SP4:phpMyAdmin-5.2.1-bp154.2.3.1.noarch",
"SUSE Package Hub 15 SP4:phpMyAdmin-apache-5.2.1-bp154.2.3.1.noarch",
"SUSE Package Hub 15 SP4:phpMyAdmin-lang-5.2.1-bp154.2.3.1.noarch",
"openSUSE Leap 15.4:phpMyAdmin-5.2.1-bp154.2.3.1.noarch",
"openSUSE Leap 15.4:phpMyAdmin-apache-5.2.1-bp154.2.3.1.noarch",
"openSUSE Leap 15.4:phpMyAdmin-lang-5.2.1-bp154.2.3.1.noarch"
]
}
],
"threats": [
{
"category": "impact",
"date": "2023-02-15T10:21:02Z",
"details": "moderate"
}
],
"title": "CVE-2023-25727"
}
]
}
OPENSUSE-SU-2023:0154-1
Vulnerability from csaf_opensuse - Published: 2023-06-27 17:51 - Updated: 2023-06-27 17:51Notes
{
"document": {
"aggregate_severity": {
"namespace": "https://www.suse.com/support/security/rating/",
"text": "moderate"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright 2024 SUSE LLC. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "Security update for phpMyAdmin",
"title": "Title of the patch"
},
{
"category": "description",
"text": "This update for phpMyAdmin fixes the following issues:\n\nUpdate to 4.9.11:\n\n- CVE-2023-25727: Fixed XSS vulnerability in drag-and-drop upload (boo#1208186).\n",
"title": "Description of the patch"
},
{
"category": "details",
"text": "openSUSE-2023-154",
"title": "Patchnames"
},
{
"category": "legal_disclaimer",
"text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).",
"title": "Terms of use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://www.suse.com/support/security/contact/",
"name": "SUSE Product Security Team",
"namespace": "https://www.suse.com/"
},
"references": [
{
"category": "external",
"summary": "SUSE ratings",
"url": "https://www.suse.com/support/security/rating/"
},
{
"category": "self",
"summary": "URL of this CSAF notice",
"url": "https://ftp.suse.com/pub/projects/security/csaf/opensuse-su-2023_0154-1.json"
},
{
"category": "self",
"summary": "URL for openSUSE-SU-2023:0154-1",
"url": "https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/SIBPCIY36W2XLHJWQUOTE37ZJ4IX6SLB/"
},
{
"category": "self",
"summary": "E-Mail link for openSUSE-SU-2023:0154-1",
"url": "https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/SIBPCIY36W2XLHJWQUOTE37ZJ4IX6SLB/"
},
{
"category": "self",
"summary": "SUSE Bug 1092345",
"url": "https://bugzilla.suse.com/1092345"
},
{
"category": "self",
"summary": "SUSE Bug 1170743",
"url": "https://bugzilla.suse.com/1170743"
},
{
"category": "self",
"summary": "SUSE Bug 1195017",
"url": "https://bugzilla.suse.com/1195017"
},
{
"category": "self",
"summary": "SUSE Bug 1208186",
"url": "https://bugzilla.suse.com/1208186"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2022-23807 page",
"url": "https://www.suse.com/security/cve/CVE-2022-23807/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2023-25727 page",
"url": "https://www.suse.com/security/cve/CVE-2023-25727/"
}
],
"title": "Security update for phpMyAdmin",
"tracking": {
"current_release_date": "2023-06-27T17:51:34Z",
"generator": {
"date": "2023-06-27T17:51:34Z",
"engine": {
"name": "cve-database.git:bin/generate-csaf.pl",
"version": "1"
}
},
"id": "openSUSE-SU-2023:0154-1",
"initial_release_date": "2023-06-27T17:51:34Z",
"revision_history": [
{
"date": "2023-06-27T17:51:34Z",
"number": "1",
"summary": "Current version"
}
],
"status": "final",
"version": "1"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_version",
"name": "phpMyAdmin-4.9.11-bp153.2.6.1.noarch",
"product": {
"name": "phpMyAdmin-4.9.11-bp153.2.6.1.noarch",
"product_id": "phpMyAdmin-4.9.11-bp153.2.6.1.noarch"
}
}
],
"category": "architecture",
"name": "noarch"
},
{
"branches": [
{
"category": "product_name",
"name": "SUSE Package Hub 12",
"product": {
"name": "SUSE Package Hub 12",
"product_id": "SUSE Package Hub 12",
"product_identification_helper": {
"cpe": "cpe:/o:suse:packagehub:12"
}
}
},
{
"category": "product_name",
"name": "SUSE Package Hub 15 SP3",
"product": {
"name": "SUSE Package Hub 15 SP3",
"product_id": "SUSE Package Hub 15 SP3"
}
},
{
"category": "product_name",
"name": "openSUSE Leap 15.3",
"product": {
"name": "openSUSE Leap 15.3",
"product_id": "openSUSE Leap 15.3",
"product_identification_helper": {
"cpe": "cpe:/o:opensuse:leap:15.3"
}
}
}
],
"category": "product_family",
"name": "SUSE Linux Enterprise"
}
],
"category": "vendor",
"name": "SUSE"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "phpMyAdmin-4.9.11-bp153.2.6.1.noarch as component of SUSE Package Hub 12",
"product_id": "SUSE Package Hub 12:phpMyAdmin-4.9.11-bp153.2.6.1.noarch"
},
"product_reference": "phpMyAdmin-4.9.11-bp153.2.6.1.noarch",
"relates_to_product_reference": "SUSE Package Hub 12"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "phpMyAdmin-4.9.11-bp153.2.6.1.noarch as component of SUSE Package Hub 15 SP3",
"product_id": "SUSE Package Hub 15 SP3:phpMyAdmin-4.9.11-bp153.2.6.1.noarch"
},
"product_reference": "phpMyAdmin-4.9.11-bp153.2.6.1.noarch",
"relates_to_product_reference": "SUSE Package Hub 15 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "phpMyAdmin-4.9.11-bp153.2.6.1.noarch as component of openSUSE Leap 15.3",
"product_id": "openSUSE Leap 15.3:phpMyAdmin-4.9.11-bp153.2.6.1.noarch"
},
"product_reference": "phpMyAdmin-4.9.11-bp153.2.6.1.noarch",
"relates_to_product_reference": "openSUSE Leap 15.3"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2022-23807",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2022-23807"
}
],
"notes": [
{
"category": "general",
"text": "An issue was discovered in phpMyAdmin 4.9 before 4.9.8 and 5.1 before 5.1.2. A valid user who is already authenticated to phpMyAdmin can manipulate their account to bypass two-factor authentication for future login instances.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Package Hub 12:phpMyAdmin-4.9.11-bp153.2.6.1.noarch",
"SUSE Package Hub 15 SP3:phpMyAdmin-4.9.11-bp153.2.6.1.noarch",
"openSUSE Leap 15.3:phpMyAdmin-4.9.11-bp153.2.6.1.noarch"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2022-23807",
"url": "https://www.suse.com/security/cve/CVE-2022-23807"
},
{
"category": "external",
"summary": "SUSE Bug 1195017 for CVE-2022-23807",
"url": "https://bugzilla.suse.com/1195017"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Package Hub 12:phpMyAdmin-4.9.11-bp153.2.6.1.noarch",
"SUSE Package Hub 15 SP3:phpMyAdmin-4.9.11-bp153.2.6.1.noarch",
"openSUSE Leap 15.3:phpMyAdmin-4.9.11-bp153.2.6.1.noarch"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.3,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N",
"version": "3.1"
},
"products": [
"SUSE Package Hub 12:phpMyAdmin-4.9.11-bp153.2.6.1.noarch",
"SUSE Package Hub 15 SP3:phpMyAdmin-4.9.11-bp153.2.6.1.noarch",
"openSUSE Leap 15.3:phpMyAdmin-4.9.11-bp153.2.6.1.noarch"
]
}
],
"threats": [
{
"category": "impact",
"date": "2023-06-27T17:51:34Z",
"details": "moderate"
}
],
"title": "CVE-2022-23807"
},
{
"cve": "CVE-2023-25727",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2023-25727"
}
],
"notes": [
{
"category": "general",
"text": "In phpMyAdmin before 4.9.11 and 5.x before 5.2.1, an authenticated user can trigger XSS by uploading a crafted .sql file through the drag-and-drop interface.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Package Hub 12:phpMyAdmin-4.9.11-bp153.2.6.1.noarch",
"SUSE Package Hub 15 SP3:phpMyAdmin-4.9.11-bp153.2.6.1.noarch",
"openSUSE Leap 15.3:phpMyAdmin-4.9.11-bp153.2.6.1.noarch"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2023-25727",
"url": "https://www.suse.com/security/cve/CVE-2023-25727"
},
{
"category": "external",
"summary": "SUSE Bug 1208186 for CVE-2023-25727",
"url": "https://bugzilla.suse.com/1208186"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Package Hub 12:phpMyAdmin-4.9.11-bp153.2.6.1.noarch",
"SUSE Package Hub 15 SP3:phpMyAdmin-4.9.11-bp153.2.6.1.noarch",
"openSUSE Leap 15.3:phpMyAdmin-4.9.11-bp153.2.6.1.noarch"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.4,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N",
"version": "3.1"
},
"products": [
"SUSE Package Hub 12:phpMyAdmin-4.9.11-bp153.2.6.1.noarch",
"SUSE Package Hub 15 SP3:phpMyAdmin-4.9.11-bp153.2.6.1.noarch",
"openSUSE Leap 15.3:phpMyAdmin-4.9.11-bp153.2.6.1.noarch"
]
}
],
"threats": [
{
"category": "impact",
"date": "2023-06-27T17:51:34Z",
"details": "moderate"
}
],
"title": "CVE-2023-25727"
}
]
}
GSD-2022-23807
Vulnerability from gsd - Updated: 2023-12-13 01:19{
"GSD": {
"alias": "CVE-2022-23807",
"description": "An issue was discovered in phpMyAdmin 4.9 before 4.9.8 and 5.1 before 5.1.2. A valid user who is already authenticated to phpMyAdmin can manipulate their account to bypass two-factor authentication for future login instances.",
"id": "GSD-2022-23807",
"references": [
"https://www.suse.com/security/cve/CVE-2022-23807.html",
"https://advisories.mageia.org/CVE-2022-23807.html"
]
},
"gsd": {
"metadata": {
"exploitCode": "unknown",
"remediation": "unknown",
"reportConfidence": "confirmed",
"type": "vulnerability"
},
"osvSchema": {
"aliases": [
"CVE-2022-23807"
],
"details": "An issue was discovered in phpMyAdmin 4.9 before 4.9.8 and 5.1 before 5.1.2. A valid user who is already authenticated to phpMyAdmin can manipulate their account to bypass two-factor authentication for future login instances.",
"id": "GSD-2022-23807",
"modified": "2023-12-13T01:19:35.470761Z",
"schema_version": "1.4.0"
}
},
"namespaces": {
"cve.org": {
"CVE_data_meta": {
"ASSIGNER": "cve@mitre.org",
"ID": "CVE-2022-23807",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_value": "n/a"
}
]
}
}
]
},
"vendor_name": "n/a"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "eng",
"value": "An issue was discovered in phpMyAdmin 4.9 before 4.9.8 and 5.1 before 5.1.2. A valid user who is already authenticated to phpMyAdmin can manipulate their account to bypass two-factor authentication for future login instances."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "n/a"
}
]
}
]
},
"references": {
"reference_data": [
{
"name": "https://www.phpmyadmin.net/security/PMASA-2022-1/",
"refsource": "MISC",
"url": "https://www.phpmyadmin.net/security/PMASA-2022-1/"
},
{
"name": "GLSA-202311-17",
"refsource": "GENTOO",
"url": "https://security.gentoo.org/glsa/202311-17"
}
]
},
"source": {
"discovery": "INTERNAL"
}
},
"gitlab.com": {
"advisories": [
{
"affected_range": "\u003e=4.9.0,\u003c4.9.8||\u003e=5.1.0,\u003c5.1.2",
"affected_versions": "All versions starting from 4.9.0 before 4.9.8, all versions starting from 5.1.0 before 5.1.2",
"cvss_v2": "AV:N/AC:L/Au:S/C:N/I:P/A:N",
"cvss_v3": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N",
"cwe_ids": [
"CWE-1035",
"CWE-287",
"CWE-937"
],
"date": "2022-01-27",
"description": "An issue was discovered in phpMyAdm. A valid user who is already authenticated to phpMyAdmin can manipulate their account to bypass two-factor authentication for future login instances.",
"fixed_versions": [
"5.0.0"
],
"identifier": "CVE-2022-23807",
"identifiers": [
"CVE-2022-23807"
],
"not_impacted": "All versions before 4.9.0, all versions starting from 4.9.8 before 5.1.0, all versions starting from 5.1.2",
"package_slug": "packagist/phpmyadmin/phpmyadmin",
"pubdate": "2022-01-22",
"solution": "Upgrade to version 5.0.0 or above.",
"title": "Improper Authentication",
"urls": [
"https://nvd.nist.gov/vuln/detail/CVE-2022-23807",
"https://www.phpmyadmin.net/security/PMASA-2022-1/"
],
"uuid": "7c859ea2-8977-48cb-9ae8-0a516cd3b4d4"
}
]
},
"nvd.nist.gov": {
"configurations": {
"CVE_data_version": "4.0",
"nodes": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:a:phpmyadmin:phpmyadmin:*:*:*:*:*:*:*:*",
"cpe_name": [],
"versionEndExcluding": "4.9.8",
"versionStartIncluding": "4.9.0",
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:phpmyadmin:phpmyadmin:*:*:*:*:*:*:*:*",
"cpe_name": [],
"versionEndExcluding": "5.1.2",
"versionStartIncluding": "5.1.0",
"vulnerable": true
}
],
"operator": "OR"
}
]
},
"cve": {
"CVE_data_meta": {
"ASSIGNER": "cve@mitre.org",
"ID": "CVE-2022-23807"
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "en",
"value": "An issue was discovered in phpMyAdmin 4.9 before 4.9.8 and 5.1 before 5.1.2. A valid user who is already authenticated to phpMyAdmin can manipulate their account to bypass two-factor authentication for future login instances."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "en",
"value": "CWE-287"
}
]
}
]
},
"references": {
"reference_data": [
{
"name": "https://www.phpmyadmin.net/security/PMASA-2022-1/",
"refsource": "MISC",
"tags": [
"Patch",
"Vendor Advisory"
],
"url": "https://www.phpmyadmin.net/security/PMASA-2022-1/"
},
{
"name": "GLSA-202311-17",
"refsource": "",
"tags": [],
"url": "https://security.gentoo.org/glsa/202311-17"
}
]
}
},
"impact": {
"baseMetricV2": {
"acInsufInfo": false,
"cvssV2": {
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "SINGLE",
"availabilityImpact": "NONE",
"baseScore": 4.0,
"confidentialityImpact": "NONE",
"integrityImpact": "PARTIAL",
"vectorString": "AV:N/AC:L/Au:S/C:N/I:P/A:N",
"version": "2.0"
},
"exploitabilityScore": 8.0,
"impactScore": 2.9,
"obtainAllPrivilege": false,
"obtainOtherPrivilege": false,
"obtainUserPrivilege": false,
"severity": "MEDIUM",
"userInteractionRequired": false
},
"baseMetricV3": {
"cvssV3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 4.3,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "LOW",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N",
"version": "3.1"
},
"exploitabilityScore": 2.8,
"impactScore": 1.4
}
},
"lastModifiedDate": "2023-11-26T12:15Z",
"publishedDate": "2022-01-22T02:15Z"
}
}
}
CNVD-2022-08180
Vulnerability from cnvd - Published: 2022-02-01目前厂商已发布升级补丁以修复漏洞,补丁获取链接: https://www.phpmyadmin.net/security/PMASA-2022-1/
| Name | ['phpMyAdmin phpMyAdmin >=5.1.0,<5.1.2', 'phpMyAdmin phpMyAdmin >=4.9.0,<4.9.8'] |
|---|
{
"cves": {
"cve": {
"cveNumber": "CVE-2022-23807"
}
},
"description": "phpMyAdmin\u662fPhpmyadmin\u56e2\u961f\u7684\u4e00\u5957\u514d\u8d39\u7684\u3001\u57fa\u4e8eWeb\u7684MySQL\u6570\u636e\u5e93\u7ba1\u7406\u5de5\u5177\u3002\u8be5\u5de5\u5177\u80fd\u591f\u521b\u5efa\u548c\u5220\u9664\u6570\u636e\u5e93\uff0c\u521b\u5efa\u3001\u5220\u9664\u3001\u4fee\u6539\u6570\u636e\u5e93\u8868\uff0c\u6267\u884cSQL\u811a\u672c\u547d\u4ee4\u7b49\u3002\n\nphpMyAdmin\u5b58\u5728\u5b89\u5168\u6f0f\u6d1e\uff0c\u8be5\u6f0f\u6d1e\u6e90\u4e8e\u7ecf\u8fc7\u8eab\u4efd\u9a8c\u8bc1\u7684\u6709\u6548\u7528\u6237\u53ef\u4ee5\u64cd\u7eb5\u5176\u4ed6\u5e10\u6237\u4ece\u800c\u7ed5\u8fc7\u672a\u6765\u767b\u5f55\u5b9e\u4f8b\u7684\u53cc\u56e0\u7d20\u8eab\u4efd\u9a8c\u8bc1\u3002\u76ee\u524d\u6ca1\u6709\u8be6\u7ec6\u7684\u6f0f\u6d1e\u7ec6\u8282\u63d0\u4f9b\u3002",
"formalWay": "\u76ee\u524d\u5382\u5546\u5df2\u53d1\u5e03\u5347\u7ea7\u8865\u4e01\u4ee5\u4fee\u590d\u6f0f\u6d1e\uff0c\u8865\u4e01\u83b7\u53d6\u94fe\u63a5\uff1a\r\nhttps://www.phpmyadmin.net/security/PMASA-2022-1/",
"isEvent": "\u901a\u7528\u8f6f\u786c\u4ef6\u6f0f\u6d1e",
"number": "CNVD-2022-08180",
"openTime": "2022-02-01",
"patchDescription": "phpMyAdmin\u662fPhpmyadmin\u56e2\u961f\u7684\u4e00\u5957\u514d\u8d39\u7684\u3001\u57fa\u4e8eWeb\u7684MySQL\u6570\u636e\u5e93\u7ba1\u7406\u5de5\u5177\u3002\u8be5\u5de5\u5177\u80fd\u591f\u521b\u5efa\u548c\u5220\u9664\u6570\u636e\u5e93\uff0c\u521b\u5efa\u3001\u5220\u9664\u3001\u4fee\u6539\u6570\u636e\u5e93\u8868\uff0c\u6267\u884cSQL\u811a\u672c\u547d\u4ee4\u7b49\u3002\r\n\r\nphpMyAdmin\u5b58\u5728\u5b89\u5168\u6f0f\u6d1e\uff0c\u8be5\u6f0f\u6d1e\u6e90\u4e8e\u7ecf\u8fc7\u8eab\u4efd\u9a8c\u8bc1\u7684\u6709\u6548\u7528\u6237\u53ef\u4ee5\u64cd\u7eb5\u5176\u4ed6\u5e10\u6237\u4ece\u800c\u7ed5\u8fc7\u672a\u6765\u767b\u5f55\u5b9e\u4f8b\u7684\u53cc\u56e0\u7d20\u8eab\u4efd\u9a8c\u8bc1\u3002\u76ee\u524d\u6ca1\u6709\u8be6\u7ec6\u7684\u6f0f\u6d1e\u7ec6\u8282\u63d0\u4f9b\u3002\u76ee\u524d\uff0c\u4f9b\u5e94\u5546\u53d1\u5e03\u4e86\u5b89\u5168\u516c\u544a\u53ca\u76f8\u5173\u8865\u4e01\u4fe1\u606f\uff0c\u4fee\u590d\u4e86\u6b64\u6f0f\u6d1e\u3002",
"patchName": "phpMyAdmin\u6388\u6743\u95ee\u9898\u6f0f\u6d1e\u7684\u8865\u4e01",
"products": {
"product": [
"phpMyAdmin phpMyAdmin \u003e=5.1.0\uff0c\u003c5.1.2",
"phpMyAdmin phpMyAdmin \u003e=4.9.0\uff0c\u003c4.9.8"
]
},
"referenceLink": "https://nvd.nist.gov/vuln/detail/CVE-2022-23807",
"serverity": "\u4e2d",
"submitTime": "2022-01-25",
"title": "phpMyAdmin\u6388\u6743\u95ee\u9898\u6f0f\u6d1e"
}
CERTFR-2022-AVI-069
Vulnerability from certfr_avis - Published: - Updated:
De multiples vulnérabilités ont été découvertes dans phpMyAdmin. Elles permettent à un attaquant de provoquer un contournement de la politique de sécurité et une injection de code indirecte à distance (XSS).
Solution
Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
None| Vendor | Product | Description | ||
|---|---|---|---|---|
| phpMyAdmin | phpMyAdmin | phpMyAdmin versions 4.9.x antérieures à 4.9.8 | ||
| phpMyAdmin | phpMyAdmin | phpMyAdmin versions 5.1.x antérieures à 5.1.2 |
| Title | Publication Time | Tags | ||||||
|---|---|---|---|---|---|---|---|---|
|
||||||||
{
"$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
"affected_systems": [
{
"description": "phpMyAdmin versions 4.9.x ant\u00e9rieures \u00e0 4.9.8",
"product": {
"name": "phpMyAdmin",
"vendor": {
"name": "phpMyAdmin",
"scada": false
}
}
},
{
"description": "phpMyAdmin versions 5.1.x ant\u00e9rieures \u00e0 5.1.2",
"product": {
"name": "phpMyAdmin",
"vendor": {
"name": "phpMyAdmin",
"scada": false
}
}
}
],
"affected_systems_content": null,
"content": "## Solution\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des\ncorrectifs (cf. section Documentation).\n",
"cves": [
{
"name": "CVE-2022-23807",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-23807"
},
{
"name": "CVE-2022-23808",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-23808"
}
],
"links": [],
"reference": "CERTFR-2022-AVI-069",
"revisions": [
{
"description": "Version initiale",
"revision_date": "2022-01-24T00:00:00.000000"
}
],
"risks": [
{
"description": "Injection de code indirecte \u00e0 distance (XSS)"
},
{
"description": "Contournement de la politique de s\u00e9curit\u00e9"
}
],
"summary": "De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 d\u00e9couvertes dans phpMyAdmin. Elles\npermettent \u00e0 un attaquant de provoquer un contournement de la politique\nde s\u00e9curit\u00e9 et une injection de code indirecte \u00e0 distance (XSS).\n",
"title": "Multiples vuln\u00e9rabilit\u00e9s dans phpMyAdmin",
"vendor_advisories": [
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 phpMyAdmin PMASA-2022-2 du 10 janvier 2022",
"url": "https://www.phpmyadmin.net/security/PMASA-2022-2"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 phpMyAdmin PMASA-2022-1 du 10 janvier 2022",
"url": "https://www.phpmyadmin.net/security/PMASA-2022-1"
}
]
}
CERTFR-2022-AVI-069
Vulnerability from certfr_avis - Published: - Updated:
De multiples vulnérabilités ont été découvertes dans phpMyAdmin. Elles permettent à un attaquant de provoquer un contournement de la politique de sécurité et une injection de code indirecte à distance (XSS).
Solution
Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
None| Vendor | Product | Description | ||
|---|---|---|---|---|
| phpMyAdmin | phpMyAdmin | phpMyAdmin versions 4.9.x antérieures à 4.9.8 | ||
| phpMyAdmin | phpMyAdmin | phpMyAdmin versions 5.1.x antérieures à 5.1.2 |
| Title | Publication Time | Tags | ||||||
|---|---|---|---|---|---|---|---|---|
|
||||||||
{
"$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
"affected_systems": [
{
"description": "phpMyAdmin versions 4.9.x ant\u00e9rieures \u00e0 4.9.8",
"product": {
"name": "phpMyAdmin",
"vendor": {
"name": "phpMyAdmin",
"scada": false
}
}
},
{
"description": "phpMyAdmin versions 5.1.x ant\u00e9rieures \u00e0 5.1.2",
"product": {
"name": "phpMyAdmin",
"vendor": {
"name": "phpMyAdmin",
"scada": false
}
}
}
],
"affected_systems_content": null,
"content": "## Solution\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des\ncorrectifs (cf. section Documentation).\n",
"cves": [
{
"name": "CVE-2022-23807",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-23807"
},
{
"name": "CVE-2022-23808",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-23808"
}
],
"links": [],
"reference": "CERTFR-2022-AVI-069",
"revisions": [
{
"description": "Version initiale",
"revision_date": "2022-01-24T00:00:00.000000"
}
],
"risks": [
{
"description": "Injection de code indirecte \u00e0 distance (XSS)"
},
{
"description": "Contournement de la politique de s\u00e9curit\u00e9"
}
],
"summary": "De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 d\u00e9couvertes dans phpMyAdmin. Elles\npermettent \u00e0 un attaquant de provoquer un contournement de la politique\nde s\u00e9curit\u00e9 et une injection de code indirecte \u00e0 distance (XSS).\n",
"title": "Multiples vuln\u00e9rabilit\u00e9s dans phpMyAdmin",
"vendor_advisories": [
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 phpMyAdmin PMASA-2022-2 du 10 janvier 2022",
"url": "https://www.phpmyadmin.net/security/PMASA-2022-2"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 phpMyAdmin PMASA-2022-1 du 10 janvier 2022",
"url": "https://www.phpmyadmin.net/security/PMASA-2022-1"
}
]
}
FKIE_CVE-2022-23807
Vulnerability from fkie_nvd - Published: 2022-01-22 02:15 - Updated: 2024-11-21 06:49| Vendor | Product | Version | |
|---|---|---|---|
| phpmyadmin | phpmyadmin | * | |
| phpmyadmin | phpmyadmin | * |
{
"configurations": [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:phpmyadmin:phpmyadmin:*:*:*:*:*:*:*:*",
"matchCriteriaId": "5CC886AA-A01D-413D-9F3A-CF2435D94779",
"versionEndExcluding": "4.9.8",
"versionStartIncluding": "4.9.0",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:phpmyadmin:phpmyadmin:*:*:*:*:*:*:*:*",
"matchCriteriaId": "45AFD905-B58E-42E9-9682-3CB2E644DCFF",
"versionEndExcluding": "5.1.2",
"versionStartIncluding": "5.1.0",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
]
}
],
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "An issue was discovered in phpMyAdmin 4.9 before 4.9.8 and 5.1 before 5.1.2. A valid user who is already authenticated to phpMyAdmin can manipulate their account to bypass two-factor authentication for future login instances."
},
{
"lang": "es",
"value": "Se ha detectado un problema en phpMyAdmin versiones 4.9 anteriores a 4.9.8 y 5.1 anteriores a 5.1.2. Un usuario v\u00e1lido que ya est\u00e1 autenticado en phpMyAdmin puede manipular su cuenta para omitir la autenticaci\u00f3n de dos factores en futuras instancias de inicio de sesi\u00f3n"
}
],
"id": "CVE-2022-23807",
"lastModified": "2024-11-21T06:49:17.580",
"metrics": {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "MEDIUM",
"cvssData": {
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "SINGLE",
"availabilityImpact": "NONE",
"baseScore": 4.0,
"confidentialityImpact": "NONE",
"integrityImpact": "PARTIAL",
"vectorString": "AV:N/AC:L/Au:S/C:N/I:P/A:N",
"version": "2.0"
},
"exploitabilityScore": 8.0,
"impactScore": 2.9,
"obtainAllPrivilege": false,
"obtainOtherPrivilege": false,
"obtainUserPrivilege": false,
"source": "nvd@nist.gov",
"type": "Primary",
"userInteractionRequired": false
}
],
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 4.3,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "LOW",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N",
"version": "3.1"
},
"exploitabilityScore": 2.8,
"impactScore": 1.4,
"source": "nvd@nist.gov",
"type": "Primary"
}
]
},
"published": "2022-01-22T02:15:07.150",
"references": [
{
"source": "cve@mitre.org",
"url": "https://security.gentoo.org/glsa/202311-17"
},
{
"source": "cve@mitre.org",
"tags": [
"Patch",
"Vendor Advisory"
],
"url": "https://www.phpmyadmin.net/security/PMASA-2022-1/"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "https://security.gentoo.org/glsa/202311-17"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Patch",
"Vendor Advisory"
],
"url": "https://www.phpmyadmin.net/security/PMASA-2022-1/"
}
],
"sourceIdentifier": "cve@mitre.org",
"vulnStatus": "Modified",
"weaknesses": [
{
"description": [
{
"lang": "en",
"value": "CWE-287"
}
],
"source": "nvd@nist.gov",
"type": "Primary"
}
]
}
GHSA-8WF2-3GGJ-78Q9
Vulnerability from github – Published: 2022-01-28 22:44 – Updated: 2024-04-22 19:09An issue was discovered in phpMyAdmin 4.9 before 4.9.8 and 5.1 before 5.1.2. A valid user who is already authenticated to phpMyAdmin can manipulate their account to bypass two-factor authentication for future login instances.
{
"affected": [
{
"package": {
"ecosystem": "Packagist",
"name": "phpmyadmin/phpmyadmin"
},
"ranges": [
{
"events": [
{
"introduced": "4.9.0"
},
{
"fixed": "4.9.8"
}
],
"type": "ECOSYSTEM"
}
]
},
{
"package": {
"ecosystem": "Packagist",
"name": "phpmyadmin/phpmyadmin"
},
"ranges": [
{
"events": [
{
"introduced": "5.1.0"
},
{
"fixed": "5.1.2"
}
],
"type": "ECOSYSTEM"
}
]
}
],
"aliases": [
"CVE-2022-23807"
],
"database_specific": {
"cwe_ids": [
"CWE-287"
],
"github_reviewed": true,
"github_reviewed_at": "2022-01-28T22:31:16Z",
"nvd_published_at": "2022-01-22T02:15:00Z",
"severity": "MODERATE"
},
"details": "An issue was discovered in phpMyAdmin 4.9 before 4.9.8 and 5.1 before 5.1.2. A valid user who is already authenticated to phpMyAdmin can manipulate their account to bypass two-factor authentication for future login instances.",
"id": "GHSA-8wf2-3ggj-78q9",
"modified": "2024-04-22T19:09:46Z",
"published": "2022-01-28T22:44:40Z",
"references": [
{
"type": "ADVISORY",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2022-23807"
},
{
"type": "WEB",
"url": "https://github.com/phpmyadmin/phpmyadmin/commit/ca54f1db050859eb8555875c6aa5d7796fdf4b32"
},
{
"type": "PACKAGE",
"url": "https://github.com/phpmyadmin/phpmyadmin"
},
{
"type": "WEB",
"url": "https://security.gentoo.org/glsa/202311-17"
},
{
"type": "WEB",
"url": "https://www.phpmyadmin.net/security/PMASA-2022-1"
}
],
"schema_version": "1.4.0",
"severity": [
{
"score": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N",
"type": "CVSS_V3"
}
],
"summary": "Improper Authentication in phpmyadmin"
}
Sightings
| Author | Source | Type | Date |
|---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or observed by the user.
- Confirmed: The vulnerability has been validated from an analyst's perspective.
- Published Proof of Concept: A public proof of concept is available for this vulnerability.
- Exploited: The vulnerability was observed as exploited by the user who reported the sighting.
- Patched: The vulnerability was observed as successfully patched by the user who reported the sighting.
- Not exploited: The vulnerability was not observed as exploited by the user who reported the sighting.
- Not confirmed: The user expressed doubt about the validity of the vulnerability.
- Not patched: The vulnerability was not observed as successfully patched by the user who reported the sighting.