Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

github логотип

GHSA-vqcm-r62w-w437

Опубликовано: 14 мая 2022
Источник: github
Github: Прошло ревью

Описание

phpMyAdmin remote variable manipulation

libraries/auth/swekey/swekey.auth.lib.php in the Swekey authentication feature in phpMyAdmin 3.x before 3.3.10.2 and 3.4.x before 3.4.3.1 assigns values to arbitrary parameters referenced in the query string, which allows remote attackers to modify the SESSION superglobal array via a crafted request, related to a "remote variable manipulation vulnerability."

Пакеты

Наименование

phpmyadmin/phpmyadmin

composer
Затронутые версииВерсия исправления

>= 3.0, < 3.3.10.2

3.3.10.2

Наименование

phpmyadmin/phpmyadmin

composer
Затронутые версииВерсия исправления

>= 3.4, < 3.4.3.1

3.4.3.1

EPSS

Процентиль: 98%
0.47906
Средний

Дефекты

CWE-94

Связанные уязвимости

ubuntu
больше 14 лет назад

libraries/auth/swekey/swekey.auth.lib.php in the Swekey authentication feature in phpMyAdmin 3.x before 3.3.10.2 and 3.4.x before 3.4.3.1 assigns values to arbitrary parameters referenced in the query string, which allows remote attackers to modify the SESSION superglobal array via a crafted request, related to a "remote variable manipulation vulnerability."

nvd
больше 14 лет назад

libraries/auth/swekey/swekey.auth.lib.php in the Swekey authentication feature in phpMyAdmin 3.x before 3.3.10.2 and 3.4.x before 3.4.3.1 assigns values to arbitrary parameters referenced in the query string, which allows remote attackers to modify the SESSION superglobal array via a crafted request, related to a "remote variable manipulation vulnerability."

debian
больше 14 лет назад

libraries/auth/swekey/swekey.auth.lib.php in the Swekey authentication ...

EPSS

Процентиль: 98%
0.47906
Средний

Дефекты

CWE-94