libraries/session.inc.php in phpMyAdmin 4.0.x before 4.0.10.13, 4.4.x before 4.4.15.3, and 4.5.x before 4.5.4 does not properly generate CSRF token values, which allows remote attackers to bypass intended access restrictions by predicting a value.
The product exposes sensitive information to an actor that is not explicitly authorized to have access to that information.
Link | Tags |
---|---|
https://github.com/phpmyadmin/phpmyadmin/commit/f20970d32c3dfdf82aef7b6c244da1f769043813 | patch |
http://lists.opensuse.org/opensuse-updates/2016-02/msg00049.html | third party advisory vendor advisory |
http://www.debian.org/security/2016/dsa-3627 | vendor advisory |
http://lists.opensuse.org/opensuse-updates/2016-02/msg00028.html | third party advisory vendor advisory |
http://lists.fedoraproject.org/pipermail/package-announce/2016-February/176739.html | third party advisory vendor advisory |
http://lists.fedoraproject.org/pipermail/package-announce/2016-February/176483.html | third party advisory vendor advisory |
http://www.phpmyadmin.net/home_page/security/PMASA-2016-2.php | patch vendor advisory |
https://github.com/phpmyadmin/phpmyadmin/commit/cb7748ac9cffcd1cd0f3081499cd4aafa9d1065e | patch |