phpMyAdmin before 2.11.5 accesses $_REQUEST to obtain some parameters instead of $_GET and $_POST, which allows attackers in the same domain to override certain variables and conduct SQL injection and Cross-Site Request Forgery (CSRF) attacks by using crafted cookies.
The web application does not, or can not, sufficiently verify whether a well-formed, valid, consistent request was intentionally provided by the user who submitted the request.
Name | Vendor | Start Version | End Version |
---|---|---|---|
Phpmyadmin | Phpmyadmin | 2.11.1.2 | 2.11.1.2 |
Phpmyadmin | Phpmyadmin | 2.11.1 | 2.11.1 |
Phpmyadmin | Phpmyadmin | * | 2.11.4 |
Phpmyadmin | Phpmyadmin | 2.11.0 | 2.11.0 |
Phpmyadmin | Phpmyadmin | 2.11.2 | 2.11.2 |
Phpmyadmin | Phpmyadmin | 2.11.2.2 | 2.11.2.2 |
Phpmyadmin | Phpmyadmin | 2.11.1 | 2.11.1 |
Phpmyadmin | Phpmyadmin | 2.11.3 | 2.11.3 |
Phpmyadmin | Phpmyadmin | 2.11.2.1 | 2.11.2.1 |
Phpmyadmin | Phpmyadmin | 2.11.3 | 2.11.3 |
Phpmyadmin | Phpmyadmin | 2.11.0 | 2.11.0 |
Phpmyadmin | Phpmyadmin | 2.11.2.0 | 2.11.2.0 |
Phpmyadmin | Phpmyadmin | 2.11.4 | 2.11.4 |
Phpmyadmin | Phpmyadmin | 2.11.1.1 | 2.11.1.1 |
Phpmyadmin | Phpmyadmin | 2.11.3.0 | 2.11.3.0 |
Phpmyadmin | Phpmyadmin | 2.11.0.0 | 2.11.0.0 |
Phpmyadmin | Phpmyadmin | 2.11.1.0 | 2.11.1.0 |
Phpmyadmin | Phpmyadmin | 2.11.0 | 2.11.0 |
Phpmyadmin | Ubuntu | dapper | * |
Phpmyadmin | Ubuntu | devel | * |
Phpmyadmin | Ubuntu | edgy | * |
Phpmyadmin | Ubuntu | feisty | * |
Phpmyadmin | Ubuntu | gutsy | * |
Phpmyadmin | Ubuntu | upstream | * |