Vulnerability Details : CVE-2016-5097
phpMyAdmin before 4.6.2 places tokens in query strings and does not arrange for them to be stripped before external navigation, which allows remote attackers to obtain sensitive information by reading (1) HTTP requests or (2) server logs.
Vulnerability category: Information leak
Products affected by CVE-2016-5097
- cpe:2.3:a:phpmyadmin:phpmyadmin:*:*:*:*:*:*:*:*
- cpe:2.3:o:opensuse:opensuse:13.1:*:*:*:*:*:*:*
Exploit prediction scoring system (EPSS) score for CVE-2016-5097
0.56%
Probability of exploitation activity in the next 30 days
EPSS Score History
~ 78 %
Percentile, the proportion of vulnerabilities that are scored at or less
CVSS scores for CVE-2016-5097
Base Score | Base Severity | CVSS Vector | Exploitability Score | Impact Score | Score Source | First Seen |
---|---|---|---|---|---|---|
5.0
|
MEDIUM | AV:N/AC:L/Au:N/C:P/I:N/A:N |
10.0
|
2.9
|
NIST | |
5.3
|
MEDIUM | CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N |
3.9
|
1.4
|
NIST |
CWE ids for CVE-2016-5097
-
The product exposes sensitive information to an actor that is not explicitly authorized to have access to that information.Assigned by: nvd@nist.gov (Primary)
References for CVE-2016-5097
-
https://security.gentoo.org/glsa/201701-32
phpMyAdmin: Multiple vulnerabilities (GLSA 201701-32) — Gentoo security
-
http://lists.opensuse.org/opensuse-updates/2016-06/msg00043.html
openSUSE-SU-2016:1556-1: moderate: Security update for phpMyAdmin
-
https://github.com/phpmyadmin/phpmyadmin/commit/5fc8020c5ba9cd2e38beb5dfe013faf2103cdf0f
Ensure links from setup go through url.php · phpmyadmin/phpmyadmin@5fc8020 · GitHubPatch
-
https://github.com/phpmyadmin/phpmyadmin/commit/8326aaebe54083d9726e153abdd303a141fe5ad3
Pass links to external sites in changelog through url.php · phpmyadmin/phpmyadmin@8326aae · GitHubPatch
-
http://www.securitytracker.com/id/1035978
phpMyAdmin Flaw Lets Remote Users Obtain Potentially Sensitive SQL Query Parameters from URLs - SecurityTracker
-
https://www.phpmyadmin.net/security/PMASA-2016-14
phpMyAdmin - Security - PMASA-2016-14Patch;Vendor Advisory
-
https://github.com/phpmyadmin/phpmyadmin/commit/59e56bd63a5e023b797d82eb272cd074e3b4bfd1
Pass link to demo server through url.php · phpmyadmin/phpmyadmin@59e56bd · GitHubPatch
-
https://github.com/phpmyadmin/phpmyadmin/commit/11eb574242d2526107366d367ab5585fbe29578f
Improve handling of logout · phpmyadmin/phpmyadmin@11eb574 · GitHubPatch
Jump to