CVE-2019-12616
Published: 05 June 2019
An issue was discovered in phpMyAdmin before 4.9.0. A vulnerability was found that allows an attacker to trigger a CSRF attack against a phpMyAdmin user. The attacker can trick the user, for instance through a broken <img> tag pointing at the victim's phpMyAdmin database, and the attacker can potentially deliver a payload (such as a specific INSERT or DELETE statement) to the victim.
From the Ubuntu security team
It was discovered that phpMyAdmin incorrectly handled some requests. An attacker could possibly use this to perform a CSRF attack.
Priority
CVSS 3 base score: 6.5
Status
Package | Release | Status |
---|---|---|
phpmyadmin Launchpad, Ubuntu, Debian |
Upstream |
Released
(4.9.0, 4:4.9.1+dfsg1-2)
|
Ubuntu 21.04 (Hirsute Hippo) |
Not vulnerable
(4:4.9.2+dfsg1-1)
|
|
Ubuntu 20.10 (Groovy Gorilla) |
Not vulnerable
(4:4.9.2+dfsg1-1)
|
|
Ubuntu 20.04 LTS (Focal Fossa) |
Not vulnerable
(4:4.9.2+dfsg1-1)
|
|
Ubuntu 18.04 LTS (Bionic Beaver) |
Released
(4:4.6.6-5ubuntu0.5)
|
|
Ubuntu 16.04 LTS (Xenial Xerus) |
Needed
|
|
Ubuntu 14.04 ESM (Trusty Tahr) |
Needed
|
References
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-12616
- https://www.phpmyadmin.net/security/PMASA-2019-4/
- https://github.com/phpmyadmin/phpmyadmin/commit/015c404038c44279d95b6430ee5a0dddc97691ec
- https://www.phpmyadmin.net/security/
- https://usn.ubuntu.com/usn/usn-4639-1
- NVD
- Launchpad
- Debian