Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

github логотип

GHSA-vqcm-r62w-w437

Опубликовано: 14 мая 2022
Источник: github
Github: Прошло ревью

Описание

phpMyAdmin remote variable manipulation

libraries/auth/swekey/swekey.auth.lib.php in the Swekey authentication feature in phpMyAdmin 3.x before 3.3.10.2 and 3.4.x before 3.4.3.1 assigns values to arbitrary parameters referenced in the query string, which allows remote attackers to modify the SESSION superglobal array via a crafted request, related to a "remote variable manipulation vulnerability."

Пакеты

Наименование

phpmyadmin/phpmyadmin

composer
Затронутые версииВерсия исправления

>= 3.0, < 3.3.10.2

3.3.10.2

Наименование

phpmyadmin/phpmyadmin

composer
Затронутые версииВерсия исправления

>= 3.4, < 3.4.3.1

3.4.3.1

EPSS

Процентиль: 96%
0.2458
Средний

Дефекты

CWE-94

Связанные уязвимости

ubuntu
почти 14 лет назад

libraries/auth/swekey/swekey.auth.lib.php in the Swekey authentication feature in phpMyAdmin 3.x before 3.3.10.2 and 3.4.x before 3.4.3.1 assigns values to arbitrary parameters referenced in the query string, which allows remote attackers to modify the SESSION superglobal array via a crafted request, related to a "remote variable manipulation vulnerability."

nvd
почти 14 лет назад

libraries/auth/swekey/swekey.auth.lib.php in the Swekey authentication feature in phpMyAdmin 3.x before 3.3.10.2 and 3.4.x before 3.4.3.1 assigns values to arbitrary parameters referenced in the query string, which allows remote attackers to modify the SESSION superglobal array via a crafted request, related to a "remote variable manipulation vulnerability."

debian
почти 14 лет назад

libraries/auth/swekey/swekey.auth.lib.php in the Swekey authentication ...

EPSS

Процентиль: 96%
0.2458
Средний

Дефекты

CWE-94