Action not permitted
Modal body text goes here.
Modal Title
Modal Body
CVE-2022-23808 (GCVE-0-2022-23808)
Vulnerability from cvelistv5
- n/a
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-03T03:51:46.011Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://www.phpmyadmin.net/security/PMASA-2022-2/" }, { "tags": [ "x_transferred" ], "url": "https://infosecwriteups.com/exploit-cve-2022-23808-85041c6e5b97" }, { "name": "GLSA-202311-17", "tags": [ "vendor-advisory", "x_transferred" ], "url": "https://security.gentoo.org/glsa/202311-17" } ], "title": "CVE Program Container" }, { "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 6.1, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "NONE", "scope": "CHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N", "version": "3.1" } }, { "other": { "content": { "id": "CVE-2022-23808", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2025-04-23T13:22:03.773377Z", "version": "2.0.3" }, "type": "ssvc" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-79", "description": "CWE-79 Improper Neutralization of Input During Web Page Generation (\u0027Cross-site Scripting\u0027)", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2025-05-05T16:25:09.948Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "descriptions": [ { "lang": "en", "value": "An issue was discovered in phpMyAdmin 5.1 before 5.1.2. An attacker can inject malicious code into aspects of the setup script, which can allow XSS or HTML injection." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2023-11-26T12:06:13.311Z", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "url": "https://www.phpmyadmin.net/security/PMASA-2022-2/" }, { "url": "https://infosecwriteups.com/exploit-cve-2022-23808-85041c6e5b97" }, { "name": "GLSA-202311-17", "tags": [ "vendor-advisory" ], "url": "https://security.gentoo.org/glsa/202311-17" } ] } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2022-23808", "datePublished": "2022-01-22T00:00:00.000Z", "dateReserved": "2022-01-21T00:00:00.000Z", "dateUpdated": "2025-05-05T16:25:09.948Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1", "vulnerability-lookup:meta": { "nvd": "{\"cve\":{\"id\":\"CVE-2022-23808\",\"sourceIdentifier\":\"cve@mitre.org\",\"published\":\"2022-01-22T02:15:07.197\",\"lastModified\":\"2025-05-05T17:17:58.507\",\"vulnStatus\":\"Modified\",\"cveTags\":[],\"descriptions\":[{\"lang\":\"en\",\"value\":\"An issue was discovered in phpMyAdmin 5.1 before 5.1.2. An attacker can inject malicious code into aspects of the setup script, which can allow XSS or HTML injection.\"},{\"lang\":\"es\",\"value\":\"Se ha detectado un problema en phpMyAdmin versiones 5.1 anteriores a 5.1.2. Un atacante puede inyectar c\u00f3digo malicioso en aspectos del script de configuraci\u00f3n, lo que puede permitir una inyecci\u00f3n de tipo XSS o HTML\"}],\"metrics\":{\"cvssMetricV31\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"3.1\",\"vectorString\":\"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N\",\"baseScore\":6.1,\"baseSeverity\":\"MEDIUM\",\"attackVector\":\"NETWORK\",\"attackComplexity\":\"LOW\",\"privilegesRequired\":\"NONE\",\"userInteraction\":\"REQUIRED\",\"scope\":\"CHANGED\",\"confidentialityImpact\":\"LOW\",\"integrityImpact\":\"LOW\",\"availabilityImpact\":\"NONE\"},\"exploitabilityScore\":2.8,\"impactScore\":2.7},{\"source\":\"134c704f-9b21-4f2e-91b3-4a467353bcc0\",\"type\":\"Secondary\",\"cvssData\":{\"version\":\"3.1\",\"vectorString\":\"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N\",\"baseScore\":6.1,\"baseSeverity\":\"MEDIUM\",\"attackVector\":\"NETWORK\",\"attackComplexity\":\"LOW\",\"privilegesRequired\":\"NONE\",\"userInteraction\":\"REQUIRED\",\"scope\":\"CHANGED\",\"confidentialityImpact\":\"LOW\",\"integrityImpact\":\"LOW\",\"availabilityImpact\":\"NONE\"},\"exploitabilityScore\":2.8,\"impactScore\":2.7}],\"cvssMetricV2\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"2.0\",\"vectorString\":\"AV:N/AC:M/Au:N/C:N/I:P/A:N\",\"baseScore\":4.3,\"accessVector\":\"NETWORK\",\"accessComplexity\":\"MEDIUM\",\"authentication\":\"NONE\",\"confidentialityImpact\":\"NONE\",\"integrityImpact\":\"PARTIAL\",\"availabilityImpact\":\"NONE\"},\"baseSeverity\":\"MEDIUM\",\"exploitabilityScore\":8.6,\"impactScore\":2.9,\"acInsufInfo\":false,\"obtainAllPrivilege\":false,\"obtainUserPrivilege\":false,\"obtainOtherPrivilege\":false,\"userInteractionRequired\":true}]},\"weaknesses\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"description\":[{\"lang\":\"en\",\"value\":\"CWE-79\"}]},{\"source\":\"134c704f-9b21-4f2e-91b3-4a467353bcc0\",\"type\":\"Secondary\",\"description\":[{\"lang\":\"en\",\"value\":\"CWE-79\"}]}],\"configurations\":[{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:phpmyadmin:phpmyadmin:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"5.1.0\",\"versionEndExcluding\":\"5.1.2\",\"matchCriteriaId\":\"45AFD905-B58E-42E9-9682-3CB2E644DCFF\"}]}]}],\"references\":[{\"url\":\"https://infosecwriteups.com/exploit-cve-2022-23808-85041c6e5b97\",\"source\":\"cve@mitre.org\"},{\"url\":\"https://security.gentoo.org/glsa/202311-17\",\"source\":\"cve@mitre.org\"},{\"url\":\"https://www.phpmyadmin.net/security/PMASA-2022-2/\",\"source\":\"cve@mitre.org\",\"tags\":[\"Patch\",\"Vendor Advisory\"]},{\"url\":\"https://infosecwriteups.com/exploit-cve-2022-23808-85041c6e5b97\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"https://security.gentoo.org/glsa/202311-17\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"https://www.phpmyadmin.net/security/PMASA-2022-2/\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Patch\",\"Vendor Advisory\"]}]}}", "vulnrichment": { "containers": "{\"adp\": [{\"title\": \"CVE Program Container\", \"references\": [{\"url\": \"https://www.phpmyadmin.net/security/PMASA-2022-2/\", \"tags\": [\"x_transferred\"]}, {\"url\": \"https://infosecwriteups.com/exploit-cve-2022-23808-85041c6e5b97\", \"tags\": [\"x_transferred\"]}, {\"url\": \"https://security.gentoo.org/glsa/202311-17\", \"name\": \"GLSA-202311-17\", \"tags\": [\"vendor-advisory\", \"x_transferred\"]}], \"providerMetadata\": {\"orgId\": \"af854a3a-2127-422b-91ae-364da2661108\", \"shortName\": \"CVE\", \"dateUpdated\": \"2024-08-03T03:51:46.011Z\"}}, {\"title\": \"CISA ADP Vulnrichment\", \"metrics\": [{\"cvssV3_1\": {\"scope\": \"CHANGED\", \"version\": \"3.1\", \"baseScore\": 6.1, \"attackVector\": \"NETWORK\", \"baseSeverity\": \"MEDIUM\", \"vectorString\": \"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N\", \"integrityImpact\": \"LOW\", \"userInteraction\": \"REQUIRED\", \"attackComplexity\": \"LOW\", \"availabilityImpact\": \"NONE\", \"privilegesRequired\": \"NONE\", \"confidentialityImpact\": \"LOW\"}}, {\"other\": {\"type\": \"ssvc\", \"content\": {\"id\": \"CVE-2022-23808\", \"role\": \"CISA Coordinator\", \"options\": [{\"Exploitation\": \"none\"}, {\"Automatable\": \"no\"}, {\"Technical Impact\": \"partial\"}], \"version\": \"2.0.3\", \"timestamp\": \"2025-04-23T13:22:03.773377Z\"}}}], \"problemTypes\": [{\"descriptions\": [{\"lang\": \"en\", \"type\": \"CWE\", \"cweId\": \"CWE-79\", \"description\": \"CWE-79 Improper Neutralization of Input During Web Page Generation (\u0027Cross-site Scripting\u0027)\"}]}], \"providerMetadata\": {\"orgId\": \"134c704f-9b21-4f2e-91b3-4a467353bcc0\", \"shortName\": \"CISA-ADP\", \"dateUpdated\": \"2025-05-05T13:16:58.337Z\"}}], \"cna\": {\"affected\": [{\"vendor\": \"n/a\", \"product\": \"n/a\", \"versions\": [{\"status\": \"affected\", \"version\": \"n/a\"}]}], \"references\": [{\"url\": \"https://www.phpmyadmin.net/security/PMASA-2022-2/\"}, {\"url\": \"https://infosecwriteups.com/exploit-cve-2022-23808-85041c6e5b97\"}, {\"url\": \"https://security.gentoo.org/glsa/202311-17\", \"name\": \"GLSA-202311-17\", \"tags\": [\"vendor-advisory\"]}], \"descriptions\": [{\"lang\": \"en\", \"value\": \"An issue was discovered in phpMyAdmin 5.1 before 5.1.2. An attacker can inject malicious code into aspects of the setup script, which can allow XSS or HTML injection.\"}], \"problemTypes\": [{\"descriptions\": [{\"lang\": \"en\", \"type\": \"text\", \"description\": \"n/a\"}]}], \"providerMetadata\": {\"orgId\": \"8254265b-2729-46b6-b9e3-3dfca2d5bfca\", \"shortName\": \"mitre\", \"dateUpdated\": \"2023-11-26T12:06:13.311Z\"}}}", "cveMetadata": "{\"cveId\": \"CVE-2022-23808\", \"state\": \"PUBLISHED\", \"dateUpdated\": \"2025-05-05T16:25:09.948Z\", \"dateReserved\": \"2022-01-21T00:00:00.000Z\", \"assignerOrgId\": \"8254265b-2729-46b6-b9e3-3dfca2d5bfca\", \"datePublished\": \"2022-01-22T00:00:00.000Z\", \"assignerShortName\": \"mitre\"}", "dataType": "CVE_RECORD", "dataVersion": "5.1" } } }
WID-SEC-W-2022-0247
Vulnerability from csaf_certbund
Notes
{ "document": { "aggregate_severity": { "text": "mittel" }, "category": "csaf_base", "csaf_version": "2.0", "distribution": { "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "de-DE", "notes": [ { "category": "legal_disclaimer", "text": "Das BSI ist als Anbieter f\u00fcr die eigenen, zur Nutzung bereitgestellten Inhalte nach den allgemeinen Gesetzen verantwortlich. Nutzerinnen und Nutzer sind jedoch daf\u00fcr verantwortlich, die Verwendung und/oder die Umsetzung der mit den Inhalten bereitgestellten Informationen sorgf\u00e4ltig im Einzelfall zu pr\u00fcfen." }, { "category": "description", "text": "phpMyAdmin ist eine in PHP geschriebene Web-Oberfl\u00e4che zur Administration von MySQL Datenbanken.", "title": "Produktbeschreibung" }, { "category": "summary", "text": "Ein entfernter anonymer oder authentisierter Angreifer kann mehrere Schwachstellen in phpMyAdmin ausnutzen, um Sicherheitsvorkehrungen zu umgehen oder einen Cross Site Scripting Angriff durchzuf\u00fchren.", "title": "Angriff" }, { "category": "general", "text": "- UNIX\n- Linux\n- Windows\n- Sonstiges", "title": "Betroffene Betriebssysteme" } ], "publisher": { "category": "other", "contact_details": "csaf-provider@cert-bund.de", "name": "Bundesamt f\u00fcr Sicherheit in der Informationstechnik", "namespace": "https://www.bsi.bund.de" }, "references": [ { "category": "self", "summary": "WID-SEC-W-2022-0247 - CSAF Version", "url": "https://wid.cert-bund.de/.well-known/csaf/white/2022/wid-sec-w-2022-0247.json" }, { "category": "self", "summary": "WID-SEC-2022-0247 - Portal Version", "url": "https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2022-0247" }, { "category": "external", "summary": "Gentoo Linux Security Advisory GLSA-202311-17 vom 2023-11-26", "url": "https://security.gentoo.org/glsa/202311-17" }, { "category": "external", "summary": "phpMyAdmin Security Announcement vom 2022-01-23", "url": "https://www.phpmyadmin.net/security/PMASA-2022-1/" }, { "category": "external", "summary": "phpMyAdmin Security Announcement vom 2022-01-23", "url": "https://www.phpmyadmin.net/security/PMASA-2022-2/" }, { "category": "external", "summary": "PoC CVE-2022-23808 vom 2022-06-09", "url": "https://github.com/Trhackno/CVE-2022-23808" } ], "source_lang": "en-US", "title": "phpMyAdmin: Mehrere Schwachstellen", "tracking": { "current_release_date": "2023-11-26T23:00:00.000+00:00", "generator": { "date": "2024-08-15T17:27:37.685+00:00", "engine": { "name": "BSI-WID", "version": "1.3.5" } }, "id": "WID-SEC-W-2022-0247", "initial_release_date": "2022-01-23T23:00:00.000+00:00", "revision_history": [ { "date": "2022-01-23T23:00:00.000+00:00", "number": "1", "summary": "Initiale Fassung" }, { "date": "2022-01-24T23:00:00.000+00:00", "number": "2", "summary": "Referenz(en) aufgenommen: FEDORA-2022-914FA8641A, FEDORA-2022-3544C7D20E" }, { "date": "2022-06-09T22:00:00.000+00:00", "number": "3", "summary": "PoC f\u00fcr CVE-2022-23808 aufgenommen" }, { "date": "2023-11-26T23:00:00.000+00:00", "number": "4", "summary": "Neue Updates von Gentoo aufgenommen" } ], "status": "final", "version": "4" } }, "product_tree": { "branches": [ { "branches": [ { "category": "product_name", "name": "Gentoo Linux", "product": { "name": "Gentoo Linux", "product_id": "T012167", "product_identification_helper": { "cpe": "cpe:/o:gentoo:linux:-" } } } ], "category": "vendor", "name": "Gentoo" }, { "branches": [ { "category": "product_name", "name": "Open Source phpMyAdmin \u003c 5.1.2", "product": { "name": "Open Source phpMyAdmin \u003c 5.1.2", "product_id": "T021796", "product_identification_helper": { "cpe": "cpe:/a:phpmyadmin:phpmyadmin:5.1.2" } } } ], "category": "vendor", "name": "Open Source" } ] }, "vulnerabilities": [ { "cve": "CVE-2022-23807", "notes": [ { "category": "description", "text": "Es existiert eine Schwachstelle in phpMyAdmin. Ein berechtigter Nutzer kann durch eine Reihe von Aktionen die Zwei-Faktor-Authentifizierung f\u00fcr dieses Konto deaktivieren. Ein authentisierter Angreifer kann diese Schwachstelle ausnutzen, um Sicherheitsvorkehrungen zu umgehen. Zur erfolgreichen Ausnutzung ist eine Benutzeraktion erforderlich." } ], "product_status": { "known_affected": [ "T012167" ] }, "release_date": "2022-01-23T23:00:00.000+00:00", "title": "CVE-2022-23807" }, { "cve": "CVE-2022-23808", "notes": [ { "category": "description", "text": "In phpMyAdmin existiert eine Cross-Site Scripting Schwachstelle. HTML und Script-Eingaben werden nicht ordnungsgem\u00e4\u00df \u00fcberpr\u00fcft, bevor sie an den Benutzer zur\u00fcckgegeben werden. Ein entfernter anonymer Angreifer kann durch Ausnutzung dieser Schwachstelle beliebigen HTML- und Script-Code durch den Browser des Benutzers im Kontext der betroffenen Seite ausf\u00fchren. Zur erfolgreichen Ausnutzung ist eine Benutzeraktion erforderlich." } ], "product_status": { "known_affected": [ "T012167" ] }, "release_date": "2022-01-23T23:00:00.000+00:00", "title": "CVE-2022-23808" } ] }
wid-sec-w-2022-0247
Vulnerability from csaf_certbund
Notes
{ "document": { "aggregate_severity": { "text": "mittel" }, "category": "csaf_base", "csaf_version": "2.0", "distribution": { "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "de-DE", "notes": [ { "category": "legal_disclaimer", "text": "Das BSI ist als Anbieter f\u00fcr die eigenen, zur Nutzung bereitgestellten Inhalte nach den allgemeinen Gesetzen verantwortlich. Nutzerinnen und Nutzer sind jedoch daf\u00fcr verantwortlich, die Verwendung und/oder die Umsetzung der mit den Inhalten bereitgestellten Informationen sorgf\u00e4ltig im Einzelfall zu pr\u00fcfen." }, { "category": "description", "text": "phpMyAdmin ist eine in PHP geschriebene Web-Oberfl\u00e4che zur Administration von MySQL Datenbanken.", "title": "Produktbeschreibung" }, { "category": "summary", "text": "Ein entfernter anonymer oder authentisierter Angreifer kann mehrere Schwachstellen in phpMyAdmin ausnutzen, um Sicherheitsvorkehrungen zu umgehen oder einen Cross Site Scripting Angriff durchzuf\u00fchren.", "title": "Angriff" }, { "category": "general", "text": "- UNIX\n- Linux\n- Windows\n- Sonstiges", "title": "Betroffene Betriebssysteme" } ], "publisher": { "category": "other", "contact_details": "csaf-provider@cert-bund.de", "name": "Bundesamt f\u00fcr Sicherheit in der Informationstechnik", "namespace": "https://www.bsi.bund.de" }, "references": [ { "category": "self", "summary": "WID-SEC-W-2022-0247 - CSAF Version", "url": "https://wid.cert-bund.de/.well-known/csaf/white/2022/wid-sec-w-2022-0247.json" }, { "category": "self", "summary": "WID-SEC-2022-0247 - Portal Version", "url": "https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2022-0247" }, { "category": "external", "summary": "Gentoo Linux Security Advisory GLSA-202311-17 vom 2023-11-26", "url": "https://security.gentoo.org/glsa/202311-17" }, { "category": "external", "summary": "phpMyAdmin Security Announcement vom 2022-01-23", "url": "https://www.phpmyadmin.net/security/PMASA-2022-1/" }, { "category": "external", "summary": "phpMyAdmin Security Announcement vom 2022-01-23", "url": "https://www.phpmyadmin.net/security/PMASA-2022-2/" }, { "category": "external", "summary": "PoC CVE-2022-23808 vom 2022-06-09", "url": "https://github.com/Trhackno/CVE-2022-23808" } ], "source_lang": "en-US", "title": "phpMyAdmin: Mehrere Schwachstellen", "tracking": { "current_release_date": "2023-11-26T23:00:00.000+00:00", "generator": { "date": "2024-08-15T17:27:37.685+00:00", "engine": { "name": "BSI-WID", "version": "1.3.5" } }, "id": "WID-SEC-W-2022-0247", "initial_release_date": "2022-01-23T23:00:00.000+00:00", "revision_history": [ { "date": "2022-01-23T23:00:00.000+00:00", "number": "1", "summary": "Initiale Fassung" }, { "date": "2022-01-24T23:00:00.000+00:00", "number": "2", "summary": "Referenz(en) aufgenommen: FEDORA-2022-914FA8641A, FEDORA-2022-3544C7D20E" }, { "date": "2022-06-09T22:00:00.000+00:00", "number": "3", "summary": "PoC f\u00fcr CVE-2022-23808 aufgenommen" }, { "date": "2023-11-26T23:00:00.000+00:00", "number": "4", "summary": "Neue Updates von Gentoo aufgenommen" } ], "status": "final", "version": "4" } }, "product_tree": { "branches": [ { "branches": [ { "category": "product_name", "name": "Gentoo Linux", "product": { "name": "Gentoo Linux", "product_id": "T012167", "product_identification_helper": { "cpe": "cpe:/o:gentoo:linux:-" } } } ], "category": "vendor", "name": "Gentoo" }, { "branches": [ { "category": "product_name", "name": "Open Source phpMyAdmin \u003c 5.1.2", "product": { "name": "Open Source phpMyAdmin \u003c 5.1.2", "product_id": "T021796", "product_identification_helper": { "cpe": "cpe:/a:phpmyadmin:phpmyadmin:5.1.2" } } } ], "category": "vendor", "name": "Open Source" } ] }, "vulnerabilities": [ { "cve": "CVE-2022-23807", "notes": [ { "category": "description", "text": "Es existiert eine Schwachstelle in phpMyAdmin. Ein berechtigter Nutzer kann durch eine Reihe von Aktionen die Zwei-Faktor-Authentifizierung f\u00fcr dieses Konto deaktivieren. Ein authentisierter Angreifer kann diese Schwachstelle ausnutzen, um Sicherheitsvorkehrungen zu umgehen. Zur erfolgreichen Ausnutzung ist eine Benutzeraktion erforderlich." } ], "product_status": { "known_affected": [ "T012167" ] }, "release_date": "2022-01-23T23:00:00.000+00:00", "title": "CVE-2022-23807" }, { "cve": "CVE-2022-23808", "notes": [ { "category": "description", "text": "In phpMyAdmin existiert eine Cross-Site Scripting Schwachstelle. HTML und Script-Eingaben werden nicht ordnungsgem\u00e4\u00df \u00fcberpr\u00fcft, bevor sie an den Benutzer zur\u00fcckgegeben werden. Ein entfernter anonymer Angreifer kann durch Ausnutzung dieser Schwachstelle beliebigen HTML- und Script-Code durch den Browser des Benutzers im Kontext der betroffenen Seite ausf\u00fchren. Zur erfolgreichen Ausnutzung ist eine Benutzeraktion erforderlich." } ], "product_status": { "known_affected": [ "T012167" ] }, "release_date": "2022-01-23T23:00:00.000+00:00", "title": "CVE-2022-23808" } ] }
opensuse-su-2024:11765-1
Vulnerability from csaf_opensuse
Notes
{ "document": { "aggregate_severity": { "namespace": "https://www.suse.com/support/security/rating/", "text": "moderate" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright 2024 SUSE LLC. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "phpMyAdmin-5.1.2-1.1 on GA media", "title": "Title of the patch" }, { "category": "description", "text": "These are all security issues fixed in the phpMyAdmin-5.1.2-1.1 package on the GA media of openSUSE Tumbleweed.", "title": "Description of the patch" }, { "category": "details", "text": "openSUSE-Tumbleweed-2024-11765", "title": "Patchnames" }, { "category": "legal_disclaimer", "text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).", "title": "Terms of use" } ], "publisher": { "category": "vendor", "contact_details": "https://www.suse.com/support/security/contact/", "name": "SUSE Product Security Team", "namespace": "https://www.suse.com/" }, "references": [ { "category": "external", "summary": "SUSE ratings", "url": "https://www.suse.com/support/security/rating/" }, { "category": "self", "summary": "URL of this CSAF notice", "url": "https://ftp.suse.com/pub/projects/security/csaf/opensuse-su-2024_11765-1.json" }, { "category": "self", "summary": "SUSE CVE CVE-2022-23807 page", "url": "https://www.suse.com/security/cve/CVE-2022-23807/" }, { "category": "self", "summary": "SUSE CVE CVE-2022-23808 page", "url": "https://www.suse.com/security/cve/CVE-2022-23808/" } ], "title": "phpMyAdmin-5.1.2-1.1 on GA media", "tracking": { "current_release_date": "2024-06-15T00:00:00Z", "generator": { "date": "2024-06-15T00:00:00Z", "engine": { "name": "cve-database.git:bin/generate-csaf.pl", "version": "1" } }, "id": "openSUSE-SU-2024:11765-1", "initial_release_date": "2024-06-15T00:00:00Z", "revision_history": [ { "date": "2024-06-15T00:00:00Z", "number": "1", "summary": "Current version" } ], "status": "final", "version": "1" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_version", "name": "phpMyAdmin-5.1.2-1.1.aarch64", "product": { "name": "phpMyAdmin-5.1.2-1.1.aarch64", "product_id": "phpMyAdmin-5.1.2-1.1.aarch64" } }, { "category": "product_version", "name": "phpMyAdmin-apache-5.1.2-1.1.aarch64", "product": { "name": "phpMyAdmin-apache-5.1.2-1.1.aarch64", "product_id": "phpMyAdmin-apache-5.1.2-1.1.aarch64" } }, { "category": "product_version", "name": "phpMyAdmin-lang-5.1.2-1.1.aarch64", "product": { "name": "phpMyAdmin-lang-5.1.2-1.1.aarch64", "product_id": "phpMyAdmin-lang-5.1.2-1.1.aarch64" } } ], "category": "architecture", "name": "aarch64" }, { "branches": [ { "category": "product_version", "name": "phpMyAdmin-5.1.2-1.1.ppc64le", "product": { "name": "phpMyAdmin-5.1.2-1.1.ppc64le", "product_id": "phpMyAdmin-5.1.2-1.1.ppc64le" } }, { "category": "product_version", "name": "phpMyAdmin-apache-5.1.2-1.1.ppc64le", "product": { "name": "phpMyAdmin-apache-5.1.2-1.1.ppc64le", "product_id": "phpMyAdmin-apache-5.1.2-1.1.ppc64le" } }, { "category": "product_version", "name": "phpMyAdmin-lang-5.1.2-1.1.ppc64le", "product": { "name": "phpMyAdmin-lang-5.1.2-1.1.ppc64le", "product_id": "phpMyAdmin-lang-5.1.2-1.1.ppc64le" } } ], "category": "architecture", "name": "ppc64le" }, { "branches": [ { "category": "product_version", "name": "phpMyAdmin-5.1.2-1.1.s390x", "product": { "name": "phpMyAdmin-5.1.2-1.1.s390x", "product_id": "phpMyAdmin-5.1.2-1.1.s390x" } }, { "category": "product_version", "name": "phpMyAdmin-apache-5.1.2-1.1.s390x", "product": { "name": "phpMyAdmin-apache-5.1.2-1.1.s390x", "product_id": "phpMyAdmin-apache-5.1.2-1.1.s390x" } }, { "category": "product_version", "name": "phpMyAdmin-lang-5.1.2-1.1.s390x", "product": { "name": "phpMyAdmin-lang-5.1.2-1.1.s390x", "product_id": "phpMyAdmin-lang-5.1.2-1.1.s390x" } } ], "category": "architecture", "name": "s390x" }, { "branches": [ { "category": "product_version", "name": "phpMyAdmin-5.1.2-1.1.x86_64", "product": { "name": "phpMyAdmin-5.1.2-1.1.x86_64", "product_id": "phpMyAdmin-5.1.2-1.1.x86_64" } }, { "category": "product_version", "name": "phpMyAdmin-apache-5.1.2-1.1.x86_64", "product": { "name": "phpMyAdmin-apache-5.1.2-1.1.x86_64", "product_id": "phpMyAdmin-apache-5.1.2-1.1.x86_64" } }, { "category": "product_version", "name": "phpMyAdmin-lang-5.1.2-1.1.x86_64", "product": { "name": "phpMyAdmin-lang-5.1.2-1.1.x86_64", "product_id": "phpMyAdmin-lang-5.1.2-1.1.x86_64" } } ], "category": "architecture", "name": "x86_64" }, { "branches": [ { "category": "product_name", "name": "openSUSE Tumbleweed", "product": { "name": "openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed", "product_identification_helper": { "cpe": "cpe:/o:opensuse:tumbleweed" } } } ], "category": "product_family", "name": "SUSE Linux Enterprise" } ], "category": "vendor", "name": "SUSE" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "phpMyAdmin-5.1.2-1.1.aarch64 as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:phpMyAdmin-5.1.2-1.1.aarch64" }, "product_reference": "phpMyAdmin-5.1.2-1.1.aarch64", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "phpMyAdmin-5.1.2-1.1.ppc64le as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:phpMyAdmin-5.1.2-1.1.ppc64le" }, "product_reference": "phpMyAdmin-5.1.2-1.1.ppc64le", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "phpMyAdmin-5.1.2-1.1.s390x as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:phpMyAdmin-5.1.2-1.1.s390x" }, "product_reference": "phpMyAdmin-5.1.2-1.1.s390x", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "phpMyAdmin-5.1.2-1.1.x86_64 as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:phpMyAdmin-5.1.2-1.1.x86_64" }, "product_reference": "phpMyAdmin-5.1.2-1.1.x86_64", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "phpMyAdmin-apache-5.1.2-1.1.aarch64 as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:phpMyAdmin-apache-5.1.2-1.1.aarch64" }, "product_reference": "phpMyAdmin-apache-5.1.2-1.1.aarch64", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "phpMyAdmin-apache-5.1.2-1.1.ppc64le as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:phpMyAdmin-apache-5.1.2-1.1.ppc64le" }, "product_reference": "phpMyAdmin-apache-5.1.2-1.1.ppc64le", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "phpMyAdmin-apache-5.1.2-1.1.s390x as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:phpMyAdmin-apache-5.1.2-1.1.s390x" }, "product_reference": "phpMyAdmin-apache-5.1.2-1.1.s390x", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "phpMyAdmin-apache-5.1.2-1.1.x86_64 as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:phpMyAdmin-apache-5.1.2-1.1.x86_64" }, "product_reference": "phpMyAdmin-apache-5.1.2-1.1.x86_64", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "phpMyAdmin-lang-5.1.2-1.1.aarch64 as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:phpMyAdmin-lang-5.1.2-1.1.aarch64" }, "product_reference": "phpMyAdmin-lang-5.1.2-1.1.aarch64", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "phpMyAdmin-lang-5.1.2-1.1.ppc64le as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:phpMyAdmin-lang-5.1.2-1.1.ppc64le" }, "product_reference": "phpMyAdmin-lang-5.1.2-1.1.ppc64le", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "phpMyAdmin-lang-5.1.2-1.1.s390x as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:phpMyAdmin-lang-5.1.2-1.1.s390x" }, "product_reference": "phpMyAdmin-lang-5.1.2-1.1.s390x", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "phpMyAdmin-lang-5.1.2-1.1.x86_64 as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:phpMyAdmin-lang-5.1.2-1.1.x86_64" }, "product_reference": "phpMyAdmin-lang-5.1.2-1.1.x86_64", "relates_to_product_reference": "openSUSE Tumbleweed" } ] }, "vulnerabilities": [ { "cve": "CVE-2022-23807", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2022-23807" } ], "notes": [ { "category": "general", "text": "An issue was discovered in phpMyAdmin 4.9 before 4.9.8 and 5.1 before 5.1.2. A valid user who is already authenticated to phpMyAdmin can manipulate their account to bypass two-factor authentication for future login instances.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:phpMyAdmin-5.1.2-1.1.aarch64", "openSUSE Tumbleweed:phpMyAdmin-5.1.2-1.1.ppc64le", "openSUSE Tumbleweed:phpMyAdmin-5.1.2-1.1.s390x", "openSUSE Tumbleweed:phpMyAdmin-5.1.2-1.1.x86_64", "openSUSE Tumbleweed:phpMyAdmin-apache-5.1.2-1.1.aarch64", "openSUSE Tumbleweed:phpMyAdmin-apache-5.1.2-1.1.ppc64le", "openSUSE Tumbleweed:phpMyAdmin-apache-5.1.2-1.1.s390x", "openSUSE Tumbleweed:phpMyAdmin-apache-5.1.2-1.1.x86_64", "openSUSE Tumbleweed:phpMyAdmin-lang-5.1.2-1.1.aarch64", "openSUSE Tumbleweed:phpMyAdmin-lang-5.1.2-1.1.ppc64le", "openSUSE Tumbleweed:phpMyAdmin-lang-5.1.2-1.1.s390x", "openSUSE Tumbleweed:phpMyAdmin-lang-5.1.2-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2022-23807", "url": "https://www.suse.com/security/cve/CVE-2022-23807" }, { "category": "external", "summary": "SUSE Bug 1195017 for CVE-2022-23807", "url": "https://bugzilla.suse.com/1195017" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:phpMyAdmin-5.1.2-1.1.aarch64", "openSUSE Tumbleweed:phpMyAdmin-5.1.2-1.1.ppc64le", "openSUSE Tumbleweed:phpMyAdmin-5.1.2-1.1.s390x", "openSUSE Tumbleweed:phpMyAdmin-5.1.2-1.1.x86_64", "openSUSE Tumbleweed:phpMyAdmin-apache-5.1.2-1.1.aarch64", "openSUSE Tumbleweed:phpMyAdmin-apache-5.1.2-1.1.ppc64le", "openSUSE Tumbleweed:phpMyAdmin-apache-5.1.2-1.1.s390x", "openSUSE Tumbleweed:phpMyAdmin-apache-5.1.2-1.1.x86_64", "openSUSE Tumbleweed:phpMyAdmin-lang-5.1.2-1.1.aarch64", "openSUSE Tumbleweed:phpMyAdmin-lang-5.1.2-1.1.ppc64le", "openSUSE Tumbleweed:phpMyAdmin-lang-5.1.2-1.1.s390x", "openSUSE Tumbleweed:phpMyAdmin-lang-5.1.2-1.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 4.3, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:phpMyAdmin-5.1.2-1.1.aarch64", "openSUSE Tumbleweed:phpMyAdmin-5.1.2-1.1.ppc64le", "openSUSE Tumbleweed:phpMyAdmin-5.1.2-1.1.s390x", "openSUSE Tumbleweed:phpMyAdmin-5.1.2-1.1.x86_64", "openSUSE Tumbleweed:phpMyAdmin-apache-5.1.2-1.1.aarch64", "openSUSE Tumbleweed:phpMyAdmin-apache-5.1.2-1.1.ppc64le", "openSUSE Tumbleweed:phpMyAdmin-apache-5.1.2-1.1.s390x", "openSUSE Tumbleweed:phpMyAdmin-apache-5.1.2-1.1.x86_64", "openSUSE Tumbleweed:phpMyAdmin-lang-5.1.2-1.1.aarch64", "openSUSE Tumbleweed:phpMyAdmin-lang-5.1.2-1.1.ppc64le", "openSUSE Tumbleweed:phpMyAdmin-lang-5.1.2-1.1.s390x", "openSUSE Tumbleweed:phpMyAdmin-lang-5.1.2-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2022-23807" }, { "cve": "CVE-2022-23808", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2022-23808" } ], "notes": [ { "category": "general", "text": "An issue was discovered in phpMyAdmin 5.1 before 5.1.2. An attacker can inject malicious code into aspects of the setup script, which can allow XSS or HTML injection.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:phpMyAdmin-5.1.2-1.1.aarch64", "openSUSE Tumbleweed:phpMyAdmin-5.1.2-1.1.ppc64le", "openSUSE Tumbleweed:phpMyAdmin-5.1.2-1.1.s390x", "openSUSE Tumbleweed:phpMyAdmin-5.1.2-1.1.x86_64", "openSUSE Tumbleweed:phpMyAdmin-apache-5.1.2-1.1.aarch64", "openSUSE Tumbleweed:phpMyAdmin-apache-5.1.2-1.1.ppc64le", "openSUSE Tumbleweed:phpMyAdmin-apache-5.1.2-1.1.s390x", "openSUSE Tumbleweed:phpMyAdmin-apache-5.1.2-1.1.x86_64", "openSUSE Tumbleweed:phpMyAdmin-lang-5.1.2-1.1.aarch64", "openSUSE Tumbleweed:phpMyAdmin-lang-5.1.2-1.1.ppc64le", "openSUSE Tumbleweed:phpMyAdmin-lang-5.1.2-1.1.s390x", "openSUSE Tumbleweed:phpMyAdmin-lang-5.1.2-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2022-23808", "url": "https://www.suse.com/security/cve/CVE-2022-23808" }, { "category": "external", "summary": "SUSE Bug 1195018 for CVE-2022-23808", "url": "https://bugzilla.suse.com/1195018" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:phpMyAdmin-5.1.2-1.1.aarch64", "openSUSE Tumbleweed:phpMyAdmin-5.1.2-1.1.ppc64le", "openSUSE Tumbleweed:phpMyAdmin-5.1.2-1.1.s390x", "openSUSE Tumbleweed:phpMyAdmin-5.1.2-1.1.x86_64", "openSUSE Tumbleweed:phpMyAdmin-apache-5.1.2-1.1.aarch64", "openSUSE Tumbleweed:phpMyAdmin-apache-5.1.2-1.1.ppc64le", "openSUSE Tumbleweed:phpMyAdmin-apache-5.1.2-1.1.s390x", "openSUSE Tumbleweed:phpMyAdmin-apache-5.1.2-1.1.x86_64", "openSUSE Tumbleweed:phpMyAdmin-lang-5.1.2-1.1.aarch64", "openSUSE Tumbleweed:phpMyAdmin-lang-5.1.2-1.1.ppc64le", "openSUSE Tumbleweed:phpMyAdmin-lang-5.1.2-1.1.s390x", "openSUSE Tumbleweed:phpMyAdmin-lang-5.1.2-1.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 6.1, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:phpMyAdmin-5.1.2-1.1.aarch64", "openSUSE Tumbleweed:phpMyAdmin-5.1.2-1.1.ppc64le", "openSUSE Tumbleweed:phpMyAdmin-5.1.2-1.1.s390x", "openSUSE Tumbleweed:phpMyAdmin-5.1.2-1.1.x86_64", "openSUSE Tumbleweed:phpMyAdmin-apache-5.1.2-1.1.aarch64", "openSUSE Tumbleweed:phpMyAdmin-apache-5.1.2-1.1.ppc64le", "openSUSE Tumbleweed:phpMyAdmin-apache-5.1.2-1.1.s390x", "openSUSE Tumbleweed:phpMyAdmin-apache-5.1.2-1.1.x86_64", "openSUSE Tumbleweed:phpMyAdmin-lang-5.1.2-1.1.aarch64", "openSUSE Tumbleweed:phpMyAdmin-lang-5.1.2-1.1.ppc64le", "openSUSE Tumbleweed:phpMyAdmin-lang-5.1.2-1.1.s390x", "openSUSE Tumbleweed:phpMyAdmin-lang-5.1.2-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2022-23808" } ] }
opensuse-su-2023:0047-1
Vulnerability from csaf_opensuse
Notes
{ "document": { "aggregate_severity": { "namespace": "https://www.suse.com/support/security/rating/", "text": "important" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright 2024 SUSE LLC. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "Security update for phpMyAdmin", "title": "Title of the patch" }, { "category": "description", "text": "This update for phpMyAdmin fixes the following issues:\n\nphpMyAdmin was updated to 5.2.1\n\nThis is a security and bufix release.\n\n* Security:\n\n - Fix (PMASA-2023-01, CWE-661, boo#1208186, CVE-2023-25727) \n Fix an XSS attack through the drag-and-drop upload feature.\n\n* Bugfixes:\n\n - issue #17522 Fix case where the routes cache file is invalid\n - issue #17506 Fix error when configuring 2FA without XMLWriter or Imagick\n - issue Fix blank page when some error occurs\n - issue #17519 Fix Export pages not working in certain conditions\n - issue #17496 Fix error in table operation page when partitions are broken\n - issue #17386 Fix system memory and system swap values on Windows\n - issue #17517 Fix Database Server panel not getting hidden by ShowServerInfo configuration directive\n - issue #17271 Fix database names not showing on Processes tab\n - issue #17424 Fix export limit size calculation\n - issue #17366 Fix refresh rate popup on Monitor page\n - issue #17577 Fix monitor charts size on RTL languages\n - issue #17121 Fix password_hash function incorrectly adding single quotes to password before hashing\n - issue #17586 Fix statistics not showing for empty databases\n - issue #17592 Clicking on the New index link on the sidebar does not throw an error anymore\n - issue #17584 It\u0027s now possible to browse a database that includes two % in its name\n - issue Fix PHP 8.2 deprecated string interpolation syntax\n - issue Some languages are now correctly detected from the HTTP header\n - issue #17617 Sorting is correctly remembered when $cfg[\u0027RememberSorting\u0027] is true\n - issue #17593 Table filtering now works when action buttons are on the right side of the row\n - issue #17388 Find and Replace using regex now makes a valid query if no matching result set found\n - issue #17551 Enum/Set editor will not fail to open when creating a new column\n - issue #17659 Fix error when a database group is named tables, views, functions, procedures or events\n - issue #17673 Allow empty values to be inserted into columns\n - issue #17620 Fix error handling at phpMyAdmin startup for the JS SQL console\n - issue Fixed debug queries console broken UI for query time and group count\n - issue Fixed escaping of SQL query and errors for the debug console\n - issue Fix console toolbar UI when the bookmark feature is disabled and sql debug is enabled\n - issue #17543 Fix JS error on saving a new designer page\n - issue #17546 Fix JS error after using save as and open page operation on the designer\n - issue Fix PHP warning on GIS visualization when there is only one GIS column\n - issue #17728 Some select HTML tags will now have the correct UI style\n - issue #17734 PHP deprecations will only be shown when in a development environment\n - issue #17369 Fix server error when blowfish_secret is not exactly 32 bytes long\n - issue #17736 Add utf8mb3 as an alias of utf8 on the charset description page\n - issue #16418 Fix FAQ 1.44 about manually removing vendor folders\n - issue #12359 Setup page now sends the Content-Security-Policy headers\n - issue #17747 The Column Visibility Toggle will not be hidden by other elements\n - issue #17756 Edit/Copy/Delete row now works when using GROUP BY\n - issue #17248 Support the UUID data type for MariaDB \u003e= 10.7\n - issue #17656 Fix replace/change/set table prefix is not working\n - issue Fix monitor page filter queries only filtering the first row\n - issue Fix \u0027Link not found!\u0027 on foreign columns for tables having no char column to show\n - issue #17390 Fix \u0027Create view\u0027 modal doesn\u0027t show on results and empty results\n - issue #17772 Fix wrong styles for add button from central columns\n - issue #17389 Fix HTML disappears when exporting settings to browser\u0027s storage\n - issue #17166 Fix \u0027Warning: #1287 \u0027X\u0027 is deprecated [...] Please use ST_X instead.\u0027 on search page\n - issue Use jquery-migrate.min.js (14KB) instead of jquery-migrate.min.js (31KB)\n - issue #17842 Use jquery.validate.min.js (24 KB) instead of jquery.validate.js (50 KB)\n - issue #17281 Fix links to databases for information_schema.SCHEMATA\n - issue #17553 Fix Metro theme unreadable links above navigation tree\n - issue #17553 Metro theme UI fixes and improvements\n - issue #17553 Fix Metro theme login form with\n - issue #16042 Exported gzip file of database has first ~73 kB uncompressed and rest is gzip compressed in Firefox\n - issue #17705 Fix inline SQL query edit FK checkbox preventing submit buttons from working\n - issue #17777 Fix Uncaught TypeError: Cannot read properties of null (reading \u0027inline\u0027) on datepickers when re-opened\n - issue Fix Original theme buttons style and login form width\n - issue #17892 Fix closing index edit modal and reopening causes it to fire twice\n - issue #17606 Fix preview SQL modal not working inside \u0027Add Index\u0027 modal\n - issue Fix PHP error on adding new column on create table form\n - issue #17482 Default to \u0027Full texts\u0027 when running explain statements\n - issue Fixed Chrome scrolling performance issue on a textarea of an \u0027export as text\u0027 page\n - issue #17703 Fix datepicker appears on all fields, not just date\n - issue Fix space in the tree line when a DB is expanded\n - issue #17340 Fix \u0027New Table\u0027 page -\u003e \u0027VIRTUAL\u0027 attribute is lost when adding a new column\n - issue #17446 Fix missing option for STORED virtual column on MySQL and PERSISTENT is not supported on MySQL\n - issue #17446 Lower the check for virtual columns to MySQL\u003e=5.7.6 nothing is supported on 5.7.5\n - issue Fix column names option for CSV Export\n - issue #17177 Fix preview SQL when reordering columns doesn\u0027t work on move columns\n - issue #15887 Fixed DROP TABLE errors ignored on multi table select for DROP\n - issue #17944 Fix unable to create a view from tree view button\n - issue #17927 Fix key navigation between select inputs (drop an old Firefox workaround)\n - issue #17967 Fix missing icon for collapse all button\n - issue #18006 Fixed UUID columns can\u0027t be moved\n - issue Add `spellcheck=\u0027false\u0027` to all password fields and some text fields to avoid spell-jacking data leaks\n - issue Remove non working \u0027Analyze Explain at MariaDB.org\u0027 button (MariaDB stopped this service)\n - issue #17229 Add support for Web Authentication API because Chrome removed support for the U2F API\n - issue #18019 Fix \u0027Call to a member function fetchAssoc() on bool\u0027 with SQL mode ONLY_FULL_GROUP_BY on monitor search logs\n - issue Add back UUID and UUID_SHORT to functions on MySQL and all MariaDB versions\n - issue #17398 Fix clicking on JSON columns triggers update query\n - issue Fix silent JSON parse error on upload progress\n - issue #17833 Fix \u0027Add Parameter\u0027 button not working for Add Routine Screen\n - issue #17365 Fixed \u0027Uncaught Error: regexp too big\u0027 on server status variables page\n\nUpdate to 5.2.0\n\n* Bugfix\n\n - issue #16521 Upgrade Bootstrap to version 5\n - issue #16521 Drop support for Internet Explorer and others\n - issue Upgrade to shapefile 3\n - issue #16555 Bump minimum PHP version to 7.2\n - issue Remove the phpseclib dependency\n - issue Upgrade Symfony components to version 5.2\n - issue Upgrade to Motranslator 4\n - issue #16005 Improve the performance of the Export logic\n - issue #16829 Add NOT LIKE %...% operator to Table search\n - issue #16845 Fixed some links not passing through url.php\n - issue #16382 Remove apc upload progress method (all upload progress code was removed from the PHP extension)\n - issue #16974 Replace zxcvbn by zxcvbn-ts\n - issue #15691 Disable the last column checkbox in the column list dropdown instead of not allowing un-check\n - issue #16138 Ignore the length of integer types and show a warning on MySQL \u003e= 8.0.18\n - issue Add support for the Mroonga engine\n - issue Double click column name to directly copy to clipboard\n - issue #16425 Add DELETE FROM table on table operations page\n - issue #16482 Add a select all link for table-specific privileges\n - issue #14276 Add support for account locking\n - issue #17143 Use composer/ca-bundle to manage the CA cert file\n - issue #17143 Require the openssl PHP extension\n - issue #17171 Remove the printview.css file from themes\n - issue #17203 Redesign the export and the import pages\n - issue #16197 Replace the master/slave terminology\n - issue #17257 Replace libraries/vendor_config.php constants with an array\n - issue Add the Bootstrap theme\n - issue #17499 Remove stickyfilljs JavaScript dependency\n\nUpdate to 5.1.3\n\nThis is a security and bufix release.\n\n* Security\n\n - Fix for boo#1197036 (CVE-2022-0813)\n - Fix for path disclosure under certain server configurations\n (if display_errors is on, for instance)\n\n* Bugfix\n\n - issue #17308 Fix broken pagination links in the navigation sidebar\n - issue #17331 Fix MariaDB has no support for system variable \u0027disabled_storage_engines\u0027\n - issue #17315 Fix unsupported operand types in Results.php when running \u0027SHOW PROCESSLIST\u0027 SQL query\n - issue #17288 Fixed importing browser settings question box after login when having no pmadb\n - issue #17288 Fix \u0027First day of calendar\u0027 user override has no effect\n - issue #17239 Fixed repeating headers are not working\n - issue #17298 Fixed import of email-adresses or links from ODS results in empty contents\n - issue #17344 Fixed a type error on ODS import with non string values\n - issue #17239 Fixed header row show/hide columns buttons on each line after hover are shown on each row\n\nUpdate to 5.1.2\n\nThis is a security and bufix release.\n\n* Security\n\n - Fix boo#1195017 (CVE-2022-23807, PMASA-2022-1, CWE-661) \n Two factor authentication bypass\n - Fix boo#1195018 (CVE-2022-23808, PMASA-2022-2, CWE-661)\n Multiple XSS and HTML injection attacks in setup script\n\n* Bugfixes\n\n - Revert a changed to $cfg[\u0027CharTextareaRows\u0027] allow values\n less than 7\n - Fix encoding of enum and set values on edit value\n - Fixed possible \u0027Undefined index: clause_is_unique\u0027 error\n - Fixed some situations where a user is logged out when working\n with more than one server\n - Fixed a problem with assigning privileges to a user using the\n multiselect list when the database name has an underscore\n - Enable cookie parameter \u0027SameSite\u0027 when the PHP version\n is 7.3 or newer\n - Correctly handle the removal of \u0027innodb_file_format\u0027 in\n MariaDB and MySQL\n\n", "title": "Description of the patch" }, { "category": "details", "text": "openSUSE-2023-47", "title": "Patchnames" }, { "category": "legal_disclaimer", "text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).", "title": "Terms of use" } ], "publisher": { "category": "vendor", "contact_details": "https://www.suse.com/support/security/contact/", "name": "SUSE Product Security Team", "namespace": "https://www.suse.com/" }, "references": [ { "category": "external", "summary": "SUSE ratings", "url": "https://www.suse.com/support/security/rating/" }, { "category": "self", "summary": "URL of this CSAF notice", "url": "https://ftp.suse.com/pub/projects/security/csaf/opensuse-su-2023_0047-1.json" }, { "category": "self", "summary": "URL for openSUSE-SU-2023:0047-1", "url": "https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/VQ5VVS2CGDQ32RHYLQQZFFFADPEZO6KM/" }, { "category": "self", "summary": "E-Mail link for openSUSE-SU-2023:0047-1", "url": "https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/VQ5VVS2CGDQ32RHYLQQZFFFADPEZO6KM/" }, { "category": "self", "summary": "SUSE Bug 1195017", "url": "https://bugzilla.suse.com/1195017" }, { "category": "self", "summary": "SUSE Bug 1195018", "url": "https://bugzilla.suse.com/1195018" }, { "category": "self", "summary": "SUSE Bug 1197036", "url": "https://bugzilla.suse.com/1197036" }, { "category": "self", "summary": "SUSE Bug 1208186", "url": "https://bugzilla.suse.com/1208186" }, { "category": "self", "summary": "SUSE CVE CVE-2022-0813 page", "url": "https://www.suse.com/security/cve/CVE-2022-0813/" }, { "category": "self", "summary": "SUSE CVE CVE-2022-23807 page", "url": "https://www.suse.com/security/cve/CVE-2022-23807/" }, { "category": "self", "summary": "SUSE CVE CVE-2022-23808 page", "url": "https://www.suse.com/security/cve/CVE-2022-23808/" }, { "category": "self", "summary": "SUSE CVE CVE-2023-25727 page", "url": "https://www.suse.com/security/cve/CVE-2023-25727/" } ], "title": "Security update for phpMyAdmin", "tracking": { "current_release_date": "2023-02-15T10:21:02Z", "generator": { "date": "2023-02-15T10:21:02Z", "engine": { "name": "cve-database.git:bin/generate-csaf.pl", "version": "1" } }, "id": "openSUSE-SU-2023:0047-1", "initial_release_date": "2023-02-15T10:21:02Z", "revision_history": [ { "date": "2023-02-15T10:21:02Z", "number": "1", "summary": "Current version" } ], "status": "final", "version": "1" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_version", "name": "phpMyAdmin-5.2.1-bp154.2.3.1.noarch", "product": { "name": "phpMyAdmin-5.2.1-bp154.2.3.1.noarch", "product_id": "phpMyAdmin-5.2.1-bp154.2.3.1.noarch" } }, { "category": "product_version", "name": "phpMyAdmin-apache-5.2.1-bp154.2.3.1.noarch", "product": { "name": "phpMyAdmin-apache-5.2.1-bp154.2.3.1.noarch", "product_id": "phpMyAdmin-apache-5.2.1-bp154.2.3.1.noarch" } }, { "category": "product_version", "name": "phpMyAdmin-lang-5.2.1-bp154.2.3.1.noarch", "product": { "name": "phpMyAdmin-lang-5.2.1-bp154.2.3.1.noarch", "product_id": "phpMyAdmin-lang-5.2.1-bp154.2.3.1.noarch" } } ], "category": "architecture", "name": "noarch" }, { "branches": [ { "category": "product_name", "name": "SUSE Package Hub 15 SP4", "product": { "name": "SUSE Package Hub 15 SP4", "product_id": "SUSE Package Hub 15 SP4" } }, { "category": "product_name", "name": "openSUSE Leap 15.4", "product": { "name": "openSUSE Leap 15.4", "product_id": "openSUSE Leap 15.4", "product_identification_helper": { "cpe": "cpe:/o:opensuse:leap:15.4" } } } ], "category": "product_family", "name": "SUSE Linux Enterprise" } ], "category": "vendor", "name": "SUSE" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "phpMyAdmin-5.2.1-bp154.2.3.1.noarch as component of SUSE Package Hub 15 SP4", "product_id": "SUSE Package Hub 15 SP4:phpMyAdmin-5.2.1-bp154.2.3.1.noarch" }, "product_reference": "phpMyAdmin-5.2.1-bp154.2.3.1.noarch", "relates_to_product_reference": "SUSE Package Hub 15 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "phpMyAdmin-apache-5.2.1-bp154.2.3.1.noarch as component of SUSE Package Hub 15 SP4", "product_id": "SUSE Package Hub 15 SP4:phpMyAdmin-apache-5.2.1-bp154.2.3.1.noarch" }, "product_reference": "phpMyAdmin-apache-5.2.1-bp154.2.3.1.noarch", "relates_to_product_reference": "SUSE Package Hub 15 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "phpMyAdmin-lang-5.2.1-bp154.2.3.1.noarch as component of SUSE Package Hub 15 SP4", "product_id": "SUSE Package Hub 15 SP4:phpMyAdmin-lang-5.2.1-bp154.2.3.1.noarch" }, "product_reference": "phpMyAdmin-lang-5.2.1-bp154.2.3.1.noarch", "relates_to_product_reference": "SUSE Package Hub 15 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "phpMyAdmin-5.2.1-bp154.2.3.1.noarch as component of openSUSE Leap 15.4", "product_id": "openSUSE Leap 15.4:phpMyAdmin-5.2.1-bp154.2.3.1.noarch" }, "product_reference": "phpMyAdmin-5.2.1-bp154.2.3.1.noarch", "relates_to_product_reference": "openSUSE Leap 15.4" }, { "category": "default_component_of", "full_product_name": { "name": "phpMyAdmin-apache-5.2.1-bp154.2.3.1.noarch as component of openSUSE Leap 15.4", "product_id": "openSUSE Leap 15.4:phpMyAdmin-apache-5.2.1-bp154.2.3.1.noarch" }, "product_reference": "phpMyAdmin-apache-5.2.1-bp154.2.3.1.noarch", "relates_to_product_reference": "openSUSE Leap 15.4" }, { "category": "default_component_of", "full_product_name": { "name": "phpMyAdmin-lang-5.2.1-bp154.2.3.1.noarch as component of openSUSE Leap 15.4", "product_id": "openSUSE Leap 15.4:phpMyAdmin-lang-5.2.1-bp154.2.3.1.noarch" }, "product_reference": "phpMyAdmin-lang-5.2.1-bp154.2.3.1.noarch", "relates_to_product_reference": "openSUSE Leap 15.4" } ] }, "vulnerabilities": [ { "cve": "CVE-2022-0813", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2022-0813" } ], "notes": [ { "category": "general", "text": "PhpMyAdmin 5.1.1 and before allows an attacker to retrieve potentially sensitive information by creating invalid requests. This affects the lang parameter, the pma_parameter, and the cookie section.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Package Hub 15 SP4:phpMyAdmin-5.2.1-bp154.2.3.1.noarch", "SUSE Package Hub 15 SP4:phpMyAdmin-apache-5.2.1-bp154.2.3.1.noarch", "SUSE Package Hub 15 SP4:phpMyAdmin-lang-5.2.1-bp154.2.3.1.noarch", "openSUSE Leap 15.4:phpMyAdmin-5.2.1-bp154.2.3.1.noarch", "openSUSE Leap 15.4:phpMyAdmin-apache-5.2.1-bp154.2.3.1.noarch", "openSUSE Leap 15.4:phpMyAdmin-lang-5.2.1-bp154.2.3.1.noarch" ] }, "references": [ { "category": "external", "summary": "CVE-2022-0813", "url": "https://www.suse.com/security/cve/CVE-2022-0813" }, { "category": "external", "summary": "SUSE Bug 1197036 for CVE-2022-0813", "url": "https://bugzilla.suse.com/1197036" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Package Hub 15 SP4:phpMyAdmin-5.2.1-bp154.2.3.1.noarch", "SUSE Package Hub 15 SP4:phpMyAdmin-apache-5.2.1-bp154.2.3.1.noarch", "SUSE Package Hub 15 SP4:phpMyAdmin-lang-5.2.1-bp154.2.3.1.noarch", "openSUSE Leap 15.4:phpMyAdmin-5.2.1-bp154.2.3.1.noarch", "openSUSE Leap 15.4:phpMyAdmin-apache-5.2.1-bp154.2.3.1.noarch", "openSUSE Leap 15.4:phpMyAdmin-lang-5.2.1-bp154.2.3.1.noarch" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.3, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N", "version": "3.1" }, "products": [ "SUSE Package Hub 15 SP4:phpMyAdmin-5.2.1-bp154.2.3.1.noarch", "SUSE Package Hub 15 SP4:phpMyAdmin-apache-5.2.1-bp154.2.3.1.noarch", "SUSE Package Hub 15 SP4:phpMyAdmin-lang-5.2.1-bp154.2.3.1.noarch", "openSUSE Leap 15.4:phpMyAdmin-5.2.1-bp154.2.3.1.noarch", "openSUSE Leap 15.4:phpMyAdmin-apache-5.2.1-bp154.2.3.1.noarch", "openSUSE Leap 15.4:phpMyAdmin-lang-5.2.1-bp154.2.3.1.noarch" ] } ], "threats": [ { "category": "impact", "date": "2023-02-15T10:21:02Z", "details": "moderate" } ], "title": "CVE-2022-0813" }, { "cve": "CVE-2022-23807", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2022-23807" } ], "notes": [ { "category": "general", "text": "An issue was discovered in phpMyAdmin 4.9 before 4.9.8 and 5.1 before 5.1.2. A valid user who is already authenticated to phpMyAdmin can manipulate their account to bypass two-factor authentication for future login instances.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Package Hub 15 SP4:phpMyAdmin-5.2.1-bp154.2.3.1.noarch", "SUSE Package Hub 15 SP4:phpMyAdmin-apache-5.2.1-bp154.2.3.1.noarch", "SUSE Package Hub 15 SP4:phpMyAdmin-lang-5.2.1-bp154.2.3.1.noarch", "openSUSE Leap 15.4:phpMyAdmin-5.2.1-bp154.2.3.1.noarch", "openSUSE Leap 15.4:phpMyAdmin-apache-5.2.1-bp154.2.3.1.noarch", "openSUSE Leap 15.4:phpMyAdmin-lang-5.2.1-bp154.2.3.1.noarch" ] }, "references": [ { "category": "external", "summary": "CVE-2022-23807", "url": "https://www.suse.com/security/cve/CVE-2022-23807" }, { "category": "external", "summary": "SUSE Bug 1195017 for CVE-2022-23807", "url": "https://bugzilla.suse.com/1195017" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Package Hub 15 SP4:phpMyAdmin-5.2.1-bp154.2.3.1.noarch", "SUSE Package Hub 15 SP4:phpMyAdmin-apache-5.2.1-bp154.2.3.1.noarch", "SUSE Package Hub 15 SP4:phpMyAdmin-lang-5.2.1-bp154.2.3.1.noarch", "openSUSE Leap 15.4:phpMyAdmin-5.2.1-bp154.2.3.1.noarch", "openSUSE Leap 15.4:phpMyAdmin-apache-5.2.1-bp154.2.3.1.noarch", "openSUSE Leap 15.4:phpMyAdmin-lang-5.2.1-bp154.2.3.1.noarch" ] } ], "scores": [ { "cvss_v3": { "baseScore": 4.3, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N", "version": "3.1" }, "products": [ "SUSE Package Hub 15 SP4:phpMyAdmin-5.2.1-bp154.2.3.1.noarch", "SUSE Package Hub 15 SP4:phpMyAdmin-apache-5.2.1-bp154.2.3.1.noarch", "SUSE Package Hub 15 SP4:phpMyAdmin-lang-5.2.1-bp154.2.3.1.noarch", "openSUSE Leap 15.4:phpMyAdmin-5.2.1-bp154.2.3.1.noarch", "openSUSE Leap 15.4:phpMyAdmin-apache-5.2.1-bp154.2.3.1.noarch", "openSUSE Leap 15.4:phpMyAdmin-lang-5.2.1-bp154.2.3.1.noarch" ] } ], "threats": [ { "category": "impact", "date": "2023-02-15T10:21:02Z", "details": "moderate" } ], "title": "CVE-2022-23807" }, { "cve": "CVE-2022-23808", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2022-23808" } ], "notes": [ { "category": "general", "text": "An issue was discovered in phpMyAdmin 5.1 before 5.1.2. An attacker can inject malicious code into aspects of the setup script, which can allow XSS or HTML injection.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Package Hub 15 SP4:phpMyAdmin-5.2.1-bp154.2.3.1.noarch", "SUSE Package Hub 15 SP4:phpMyAdmin-apache-5.2.1-bp154.2.3.1.noarch", "SUSE Package Hub 15 SP4:phpMyAdmin-lang-5.2.1-bp154.2.3.1.noarch", "openSUSE Leap 15.4:phpMyAdmin-5.2.1-bp154.2.3.1.noarch", "openSUSE Leap 15.4:phpMyAdmin-apache-5.2.1-bp154.2.3.1.noarch", "openSUSE Leap 15.4:phpMyAdmin-lang-5.2.1-bp154.2.3.1.noarch" ] }, "references": [ { "category": "external", "summary": "CVE-2022-23808", "url": "https://www.suse.com/security/cve/CVE-2022-23808" }, { "category": "external", "summary": "SUSE Bug 1195018 for CVE-2022-23808", "url": "https://bugzilla.suse.com/1195018" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Package Hub 15 SP4:phpMyAdmin-5.2.1-bp154.2.3.1.noarch", "SUSE Package Hub 15 SP4:phpMyAdmin-apache-5.2.1-bp154.2.3.1.noarch", "SUSE Package Hub 15 SP4:phpMyAdmin-lang-5.2.1-bp154.2.3.1.noarch", "openSUSE Leap 15.4:phpMyAdmin-5.2.1-bp154.2.3.1.noarch", "openSUSE Leap 15.4:phpMyAdmin-apache-5.2.1-bp154.2.3.1.noarch", "openSUSE Leap 15.4:phpMyAdmin-lang-5.2.1-bp154.2.3.1.noarch" ] } ], "scores": [ { "cvss_v3": { "baseScore": 6.1, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N", "version": "3.1" }, "products": [ "SUSE Package Hub 15 SP4:phpMyAdmin-5.2.1-bp154.2.3.1.noarch", "SUSE Package Hub 15 SP4:phpMyAdmin-apache-5.2.1-bp154.2.3.1.noarch", "SUSE Package Hub 15 SP4:phpMyAdmin-lang-5.2.1-bp154.2.3.1.noarch", "openSUSE Leap 15.4:phpMyAdmin-5.2.1-bp154.2.3.1.noarch", "openSUSE Leap 15.4:phpMyAdmin-apache-5.2.1-bp154.2.3.1.noarch", "openSUSE Leap 15.4:phpMyAdmin-lang-5.2.1-bp154.2.3.1.noarch" ] } ], "threats": [ { "category": "impact", "date": "2023-02-15T10:21:02Z", "details": "moderate" } ], "title": "CVE-2022-23808" }, { "cve": "CVE-2023-25727", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2023-25727" } ], "notes": [ { "category": "general", "text": "In phpMyAdmin before 4.9.11 and 5.x before 5.2.1, an authenticated user can trigger XSS by uploading a crafted .sql file through the drag-and-drop interface.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Package Hub 15 SP4:phpMyAdmin-5.2.1-bp154.2.3.1.noarch", "SUSE Package Hub 15 SP4:phpMyAdmin-apache-5.2.1-bp154.2.3.1.noarch", "SUSE Package Hub 15 SP4:phpMyAdmin-lang-5.2.1-bp154.2.3.1.noarch", "openSUSE Leap 15.4:phpMyAdmin-5.2.1-bp154.2.3.1.noarch", "openSUSE Leap 15.4:phpMyAdmin-apache-5.2.1-bp154.2.3.1.noarch", "openSUSE Leap 15.4:phpMyAdmin-lang-5.2.1-bp154.2.3.1.noarch" ] }, "references": [ { "category": "external", "summary": "CVE-2023-25727", "url": "https://www.suse.com/security/cve/CVE-2023-25727" }, { "category": "external", "summary": "SUSE Bug 1208186 for CVE-2023-25727", "url": "https://bugzilla.suse.com/1208186" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Package Hub 15 SP4:phpMyAdmin-5.2.1-bp154.2.3.1.noarch", "SUSE Package Hub 15 SP4:phpMyAdmin-apache-5.2.1-bp154.2.3.1.noarch", "SUSE Package Hub 15 SP4:phpMyAdmin-lang-5.2.1-bp154.2.3.1.noarch", "openSUSE Leap 15.4:phpMyAdmin-5.2.1-bp154.2.3.1.noarch", "openSUSE Leap 15.4:phpMyAdmin-apache-5.2.1-bp154.2.3.1.noarch", "openSUSE Leap 15.4:phpMyAdmin-lang-5.2.1-bp154.2.3.1.noarch" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.4, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N", "version": "3.1" }, "products": [ "SUSE Package Hub 15 SP4:phpMyAdmin-5.2.1-bp154.2.3.1.noarch", "SUSE Package Hub 15 SP4:phpMyAdmin-apache-5.2.1-bp154.2.3.1.noarch", "SUSE Package Hub 15 SP4:phpMyAdmin-lang-5.2.1-bp154.2.3.1.noarch", "openSUSE Leap 15.4:phpMyAdmin-5.2.1-bp154.2.3.1.noarch", "openSUSE Leap 15.4:phpMyAdmin-apache-5.2.1-bp154.2.3.1.noarch", "openSUSE Leap 15.4:phpMyAdmin-lang-5.2.1-bp154.2.3.1.noarch" ] } ], "threats": [ { "category": "impact", "date": "2023-02-15T10:21:02Z", "details": "moderate" } ], "title": "CVE-2023-25727" } ] }
fkie_cve-2022-23808
Vulnerability from fkie_nvd
6.1 (Medium) - CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N
Vendor | Product | Version | |
---|---|---|---|
phpmyadmin | phpmyadmin | * |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:phpmyadmin:phpmyadmin:*:*:*:*:*:*:*:*", "matchCriteriaId": "45AFD905-B58E-42E9-9682-3CB2E644DCFF", "versionEndExcluding": "5.1.2", "versionStartIncluding": "5.1.0", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "An issue was discovered in phpMyAdmin 5.1 before 5.1.2. An attacker can inject malicious code into aspects of the setup script, which can allow XSS or HTML injection." }, { "lang": "es", "value": "Se ha detectado un problema en phpMyAdmin versiones 5.1 anteriores a 5.1.2. Un atacante puede inyectar c\u00f3digo malicioso en aspectos del script de configuraci\u00f3n, lo que puede permitir una inyecci\u00f3n de tipo XSS o HTML" } ], "id": "CVE-2022-23808", "lastModified": "2025-05-05T17:17:58.507", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 4.3, "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N", "version": "2.0" }, "exploitabilityScore": 8.6, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": true } ], "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 6.1, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "NONE", "scope": "CHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N", "version": "3.1" }, "exploitabilityScore": 2.8, "impactScore": 2.7, "source": "nvd@nist.gov", "type": "Primary" }, { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 6.1, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "NONE", "scope": "CHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N", "version": "3.1" }, "exploitabilityScore": 2.8, "impactScore": 2.7, "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "type": "Secondary" } ] }, "published": "2022-01-22T02:15:07.197", "references": [ { "source": "cve@mitre.org", "url": "https://infosecwriteups.com/exploit-cve-2022-23808-85041c6e5b97" }, { "source": "cve@mitre.org", "url": "https://security.gentoo.org/glsa/202311-17" }, { "source": "cve@mitre.org", "tags": [ "Patch", "Vendor Advisory" ], "url": "https://www.phpmyadmin.net/security/PMASA-2022-2/" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://infosecwriteups.com/exploit-cve-2022-23808-85041c6e5b97" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://security.gentoo.org/glsa/202311-17" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch", "Vendor Advisory" ], "url": "https://www.phpmyadmin.net/security/PMASA-2022-2/" } ], "sourceIdentifier": "cve@mitre.org", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-79" } ], "source": "nvd@nist.gov", "type": "Primary" }, { "description": [ { "lang": "en", "value": "CWE-79" } ], "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "type": "Secondary" } ] }
ghsa-vcwc-6mr9-8m7c
Vulnerability from github
An issue was discovered in phpMyAdmin 5.1 before 5.1.2. An attacker can inject malicious code into aspects of the setup script, which can allow XSS or HTML injection.
{ "affected": [ { "package": { "ecosystem": "Packagist", "name": "phpmyadmin/phpmyadmin" }, "ranges": [ { "events": [ { "introduced": "5.1.0" }, { "fixed": "5.1.2" } ], "type": "ECOSYSTEM" } ] } ], "aliases": [ "CVE-2022-23808" ], "database_specific": { "cwe_ids": [ "CWE-79" ], "github_reviewed": true, "github_reviewed_at": "2022-01-28T22:29:33Z", "nvd_published_at": "2022-01-22T02:15:00Z", "severity": "MODERATE" }, "details": "An issue was discovered in phpMyAdmin 5.1 before 5.1.2. An attacker can inject malicious code into aspects of the setup script, which can allow XSS or HTML injection.", "id": "GHSA-vcwc-6mr9-8m7c", "modified": "2024-04-22T19:39:11Z", "published": "2022-01-28T22:36:28Z", "references": [ { "type": "ADVISORY", "url": "https://nvd.nist.gov/vuln/detail/CVE-2022-23808" }, { "type": "WEB", "url": "https://github.com/phpmyadmin/phpmyadmin/commit/44eb12f15a562718bbe54c9a16af91ceea335d59" }, { "type": "WEB", "url": "https://github.com/phpmyadmin/phpmyadmin/commit/5118acce1dfcdb09cbc0f73927bf51c46feeaf38" }, { "type": "PACKAGE", "url": "https://github.com/phpmyadmin/phpmyadmin" }, { "type": "WEB", "url": "https://infosecwriteups.com/exploit-cve-2022-23808-85041c6e5b97" }, { "type": "WEB", "url": "https://security.gentoo.org/glsa/202311-17" }, { "type": "WEB", "url": "https://www.phpmyadmin.net/security/PMASA-2022-2" } ], "schema_version": "1.4.0", "severity": [ { "score": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N", "type": "CVSS_V3" } ], "summary": "Cross-site Scripting in phpmyadmin" }
gsd-2022-23808
Vulnerability from gsd
{ "GSD": { "alias": "CVE-2022-23808", "description": "An issue was discovered in phpMyAdmin 5.1 before 5.1.2. An attacker can inject malicious code into aspects of the setup script, which can allow XSS or HTML injection.", "id": "GSD-2022-23808", "references": [ "https://www.suse.com/security/cve/CVE-2022-23808.html", "https://advisories.mageia.org/CVE-2022-23808.html" ] }, "gsd": { "metadata": { "exploitCode": "unknown", "remediation": "unknown", "reportConfidence": "confirmed", "type": "vulnerability" }, "osvSchema": { "aliases": [ "CVE-2022-23808" ], "details": "An issue was discovered in phpMyAdmin 5.1 before 5.1.2. An attacker can inject malicious code into aspects of the setup script, which can allow XSS or HTML injection.", "id": "GSD-2022-23808", "modified": "2023-12-13T01:19:35.064903Z", "schema_version": "1.4.0" } }, "namespaces": { "cve.org": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2022-23808", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "An issue was discovered in phpMyAdmin 5.1 before 5.1.2. An attacker can inject malicious code into aspects of the setup script, which can allow XSS or HTML injection." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "https://www.phpmyadmin.net/security/PMASA-2022-2/", "refsource": "MISC", "url": "https://www.phpmyadmin.net/security/PMASA-2022-2/" }, { "name": "https://infosecwriteups.com/exploit-cve-2022-23808-85041c6e5b97", "refsource": "MISC", "url": "https://infosecwriteups.com/exploit-cve-2022-23808-85041c6e5b97" }, { "name": "GLSA-202311-17", "refsource": "GENTOO", "url": "https://security.gentoo.org/glsa/202311-17" } ] } }, "gitlab.com": { "advisories": [ { "affected_range": "\u003e=5.1.0,\u003c5.1.2", "affected_versions": "All versions starting from 5.1.0 before 5.1.2", "cvss_v2": "AV:N/AC:M/Au:N/C:N/I:P/A:N", "cvss_v3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N", "cwe_ids": [ "CWE-1035", "CWE-79", "CWE-937" ], "date": "2023-04-29", "description": "An attacker can inject malicious code into aspects of the setup script, which can allow XSS or HTML injection.", "fixed_versions": [ "5.1.2" ], "identifier": "CVE-2022-23808", "identifiers": [ "CVE-2022-23808" ], "not_impacted": "All versions before 5.1.0, all versions starting from 5.1.2", "package_slug": "packagist/phpmyadmin/phpmyadmin", "pubdate": "2022-01-22", "solution": "Upgrade to version 5.1.2 or above.", "title": "Improper Neutralization of Input During Web Page Generation (\u0027Cross-site Scripting\u0027)", "urls": [ "https://nvd.nist.gov/vuln/detail/CVE-2022-23808", "https://www.phpmyadmin.net/security/PMASA-2022-2/" ], "uuid": "4e64fbc9-2377-4abc-abdb-7335015b190d" } ] }, "nvd.nist.gov": { "configurations": { "CVE_data_version": "4.0", "nodes": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:a:phpmyadmin:phpmyadmin:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndExcluding": "5.1.2", "versionStartIncluding": "5.1.0", "vulnerable": true } ], "operator": "OR" } ] }, "cve": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2022-23808" }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "en", "value": "An issue was discovered in phpMyAdmin 5.1 before 5.1.2. An attacker can inject malicious code into aspects of the setup script, which can allow XSS or HTML injection." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "en", "value": "CWE-79" } ] } ] }, "references": { "reference_data": [ { "name": "https://www.phpmyadmin.net/security/PMASA-2022-2/", "refsource": "MISC", "tags": [ "Patch", "Vendor Advisory" ], "url": "https://www.phpmyadmin.net/security/PMASA-2022-2/" }, { "name": "https://infosecwriteups.com/exploit-cve-2022-23808-85041c6e5b97", "refsource": "MISC", "tags": [], "url": "https://infosecwriteups.com/exploit-cve-2022-23808-85041c6e5b97" }, { "name": "GLSA-202311-17", "refsource": "", "tags": [], "url": "https://security.gentoo.org/glsa/202311-17" } ] } }, "impact": { "baseMetricV2": { "acInsufInfo": false, "cvssV2": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 4.3, "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N", "version": "2.0" }, "exploitabilityScore": 8.6, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "severity": "MEDIUM", "userInteractionRequired": true }, "baseMetricV3": { "cvssV3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 6.1, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "NONE", "scope": "CHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N", "version": "3.1" }, "exploitabilityScore": 2.8, "impactScore": 2.7 } }, "lastModifiedDate": "2023-11-26T12:15Z", "publishedDate": "2022-01-22T02:15Z" } } }
cnvd-2022-08031
Vulnerability from cnvd
Title: phpMyAdmin跨站脚本漏洞(CNVD-2022-08031)
Description:
phpMyAdmin是Phpmyadmin团队的一套免费的、基于Web的MySQL数据库管理工具。该工具能够创建和删除数据库,创建、删除、修改数据库表,执行SQL脚本命令等。
phpMyAdmin存在跨站脚本漏洞,该漏洞源于WEB应用缺少对客户端数据的正确验证。攻击者可利用该漏洞执行客户端代码。
Severity: 中
Patch Name: phpMyAdmin跨站脚本漏洞(CNVD-2022-08031)的补丁
Patch Description:
phpMyAdmin是Phpmyadmin团队的一套免费的、基于Web的MySQL数据库管理工具。该工具能够创建和删除数据库,创建、删除、修改数据库表,执行SQL脚本命令等。
phpMyAdmin存在跨站脚本漏洞,该漏洞源于WEB应用缺少对客户端数据的正确验证。攻击者可利用该漏洞执行客户端代码。目前,供应商发布了安全公告及相关补丁信息,修复了此漏洞。
Formal description:
目前厂商已发布升级补丁以修复漏洞,补丁获取链接: https://www.phpmyadmin.net/security/PMASA-2022-2/
Reference: https://nvd.nist.gov/vuln/detail/CVE-2022-23808
Name | phpMyAdmin phpMyAdmin >=5.1.0,<5.1.2 |
---|
{ "cves": { "cve": { "cveNumber": "CVE-2022-23808" } }, "description": "phpMyAdmin\u662fPhpmyadmin\u56e2\u961f\u7684\u4e00\u5957\u514d\u8d39\u7684\u3001\u57fa\u4e8eWeb\u7684MySQL\u6570\u636e\u5e93\u7ba1\u7406\u5de5\u5177\u3002\u8be5\u5de5\u5177\u80fd\u591f\u521b\u5efa\u548c\u5220\u9664\u6570\u636e\u5e93\uff0c\u521b\u5efa\u3001\u5220\u9664\u3001\u4fee\u6539\u6570\u636e\u5e93\u8868\uff0c\u6267\u884cSQL\u811a\u672c\u547d\u4ee4\u7b49\u3002\n\nphpMyAdmin\u5b58\u5728\u8de8\u7ad9\u811a\u672c\u6f0f\u6d1e\uff0c\u8be5\u6f0f\u6d1e\u6e90\u4e8eWEB\u5e94\u7528\u7f3a\u5c11\u5bf9\u5ba2\u6237\u7aef\u6570\u636e\u7684\u6b63\u786e\u9a8c\u8bc1\u3002\u653b\u51fb\u8005\u53ef\u5229\u7528\u8be5\u6f0f\u6d1e\u6267\u884c\u5ba2\u6237\u7aef\u4ee3\u7801\u3002", "formalWay": "\u76ee\u524d\u5382\u5546\u5df2\u53d1\u5e03\u5347\u7ea7\u8865\u4e01\u4ee5\u4fee\u590d\u6f0f\u6d1e\uff0c\u8865\u4e01\u83b7\u53d6\u94fe\u63a5\uff1a\r\nhttps://www.phpmyadmin.net/security/PMASA-2022-2/", "isEvent": "\u901a\u7528\u8f6f\u786c\u4ef6\u6f0f\u6d1e", "number": "CNVD-2022-08031", "openTime": "2022-02-01", "patchDescription": "phpMyAdmin\u662fPhpmyadmin\u56e2\u961f\u7684\u4e00\u5957\u514d\u8d39\u7684\u3001\u57fa\u4e8eWeb\u7684MySQL\u6570\u636e\u5e93\u7ba1\u7406\u5de5\u5177\u3002\u8be5\u5de5\u5177\u80fd\u591f\u521b\u5efa\u548c\u5220\u9664\u6570\u636e\u5e93\uff0c\u521b\u5efa\u3001\u5220\u9664\u3001\u4fee\u6539\u6570\u636e\u5e93\u8868\uff0c\u6267\u884cSQL\u811a\u672c\u547d\u4ee4\u7b49\u3002\r\n\r\nphpMyAdmin\u5b58\u5728\u8de8\u7ad9\u811a\u672c\u6f0f\u6d1e\uff0c\u8be5\u6f0f\u6d1e\u6e90\u4e8eWEB\u5e94\u7528\u7f3a\u5c11\u5bf9\u5ba2\u6237\u7aef\u6570\u636e\u7684\u6b63\u786e\u9a8c\u8bc1\u3002\u653b\u51fb\u8005\u53ef\u5229\u7528\u8be5\u6f0f\u6d1e\u6267\u884c\u5ba2\u6237\u7aef\u4ee3\u7801\u3002\u76ee\u524d\uff0c\u4f9b\u5e94\u5546\u53d1\u5e03\u4e86\u5b89\u5168\u516c\u544a\u53ca\u76f8\u5173\u8865\u4e01\u4fe1\u606f\uff0c\u4fee\u590d\u4e86\u6b64\u6f0f\u6d1e\u3002", "patchName": "phpMyAdmin\u8de8\u7ad9\u811a\u672c\u6f0f\u6d1e\uff08CNVD-2022-08031\uff09\u7684\u8865\u4e01", "products": { "product": "phpMyAdmin phpMyAdmin \u003e=5.1.0\uff0c\u003c5.1.2" }, "referenceLink": "https://nvd.nist.gov/vuln/detail/CVE-2022-23808", "serverity": "\u4e2d", "submitTime": "2022-01-25", "title": "phpMyAdmin\u8de8\u7ad9\u811a\u672c\u6f0f\u6d1e\uff08CNVD-2022-08031\uff09" }
Sightings
Author | Source | Type | Date |
---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
- Confirmed: The vulnerability is confirmed from an analyst perspective.
- Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
- Patched: This vulnerability was successfully patched by the user reporting the sighting.
- Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
- Not confirmed: The user expresses doubt about the veracity of the vulnerability.
- Not patched: This vulnerability was not successfully patched by the user reporting the sighting.