An issue was discovered in phpMyAdmin. A user can be tricked into following a link leading to phpMyAdmin, which after authentication redirects to another malicious site. The attacker must sniff the user's valid phpMyAdmin token. All 4.0.x versions (prior to 4.0.10.16) are affected.
References
| Link | Resource |
|---|---|
| http://www.securityfocus.com/bid/94519 | Third Party Advisory VDB Entry |
| https://security.gentoo.org/glsa/201701-32 | |
| https://www.phpmyadmin.net/security/PMASA-2016-57 | Patch Vendor Advisory |
| http://www.securityfocus.com/bid/94519 | Third Party Advisory VDB Entry |
| https://security.gentoo.org/glsa/201701-32 | |
| https://www.phpmyadmin.net/security/PMASA-2016-57 | Patch Vendor Advisory |
Configurations
Configuration 1 (hide)
|
History
21 Nov 2024, 02:52
| Type | Values Removed | Values Added |
|---|---|---|
| References | () http://www.securityfocus.com/bid/94519 - Third Party Advisory, VDB Entry | |
| References | () https://security.gentoo.org/glsa/201701-32 - | |
| References | () https://www.phpmyadmin.net/security/PMASA-2016-57 - Patch, Vendor Advisory |
Information
Published : 2016-12-11 02:59
Updated : 2025-04-12 10:46
NVD link : CVE-2016-4412
Mitre link : CVE-2016-4412
CVE.ORG link : CVE-2016-4412
JSON object : View
Products Affected
phpmyadmin
- phpmyadmin
CWE
CWE-254
7PK - Security Features
