ID DEBIAN_DLA-551.NASL Type nessus Reporter This script is Copyright (C) 2016-2021 and is owned by Tenable, Inc. or an Affiliate thereof. Modified 2016-07-18T00:00:00
Description
Phpmyadmin, a web administration tool for MySQL, had several Cross
Site Scripting (XSS) vulnerabilities were reported.
CVE-2016-5731
With a specially crafted request, it is possible to trigger an XSS
attack through the example OpenID authentication script.
CVE-2016-5733
Several XSS vulnerabilities were found with the Transformation
feature. Also a vulnerability was reported allowing a specifically-
configured MySQL server to execute an XSS attack. This particular
attack requires configuring the MySQL server log_bin directive with
the payload.
CVE-2016-5739
A vulnerability was reported where a specially crafted Transformation
could be used to leak information including the authentication token.
This could be used to direct a CSRF attack against a user.
For Debian 7 'Wheezy', these problems have been fixed in version
4:3.4.11.1-2+deb7u5.
We recommend that you upgrade your phpmyadmin packages.
NOTE: Tenable Network Security has extracted the preceding description
block directly from the DLA security advisory. Tenable has attempted
to automatically clean and format it as much as possible without
introducing additional issues.
#%NASL_MIN_LEVEL 70300
#
# (C) Tenable Network Security, Inc.
#
# The descriptive text and package checks in this plugin were
# extracted from Debian Security Advisory DLA-551-1. The text
# itself is copyright (C) Software in the Public Interest, Inc.
#
include('deprecated_nasl_level.inc');
include('compat.inc');
if (description)
{
script_id(92326);
script_version("2.7");
script_set_attribute(attribute:"plugin_modification_date", value:"2021/01/11");
script_cve_id("CVE-2016-5731", "CVE-2016-5733", "CVE-2016-5739");
script_name(english:"Debian DLA-551-1 : phpmyadmin security update");
script_summary(english:"Checks dpkg output for the updated package.");
script_set_attribute(
attribute:"synopsis",
value:"The remote Debian host is missing a security update."
);
script_set_attribute(
attribute:"description",
value:
"Phpmyadmin, a web administration tool for MySQL, had several Cross
Site Scripting (XSS) vulnerabilities were reported.
CVE-2016-5731
With a specially crafted request, it is possible to trigger an XSS
attack through the example OpenID authentication script.
CVE-2016-5733
Several XSS vulnerabilities were found with the Transformation
feature. Also a vulnerability was reported allowing a specifically-
configured MySQL server to execute an XSS attack. This particular
attack requires configuring the MySQL server log_bin directive with
the payload.
CVE-2016-5739
A vulnerability was reported where a specially crafted Transformation
could be used to leak information including the authentication token.
This could be used to direct a CSRF attack against a user.
For Debian 7 'Wheezy', these problems have been fixed in version
4:3.4.11.1-2+deb7u5.
We recommend that you upgrade your phpmyadmin packages.
NOTE: Tenable Network Security has extracted the preceding description
block directly from the DLA security advisory. Tenable has attempted
to automatically clean and format it as much as possible without
introducing additional issues."
);
script_set_attribute(
attribute:"see_also",
value:"https://lists.debian.org/debian-lts-announce/2016/07/msg00013.html"
);
script_set_attribute(
attribute:"see_also",
value:"https://packages.debian.org/source/wheezy/phpmyadmin"
);
script_set_attribute(
attribute:"solution",
value:"Upgrade the affected phpmyadmin package."
);
script_set_cvss_base_vector("CVSS2#AV:N/AC:L/Au:N/C:P/I:N/A:N");
script_set_cvss_temporal_vector("CVSS2#E:U/RL:OF/RC:C");
script_set_cvss3_base_vector("CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N");
script_set_cvss3_temporal_vector("CVSS:3.0/E:U/RL:O/RC:C");
script_set_attribute(attribute:"exploitability_ease", value:"No known exploits are available");
script_set_attribute(attribute:"exploit_available", value:"false");
script_set_attribute(attribute:"plugin_type", value:"local");
script_set_attribute(attribute:"cpe", value:"p-cpe:/a:debian:debian_linux:phpmyadmin");
script_set_attribute(attribute:"cpe", value:"cpe:/o:debian:debian_linux:7.0");
script_set_attribute(attribute:"patch_publication_date", value:"2016/07/17");
script_set_attribute(attribute:"plugin_publication_date", value:"2016/07/18");
script_end_attributes();
script_category(ACT_GATHER_INFO);
script_copyright(english:"This script is Copyright (C) 2016-2021 and is owned by Tenable, Inc. or an Affiliate thereof.");
script_family(english:"Debian Local Security Checks");
script_dependencies("ssh_get_info.nasl");
script_require_keys("Host/local_checks_enabled", "Host/Debian/release", "Host/Debian/dpkg-l");
exit(0);
}
include("audit.inc");
include("debian_package.inc");
if (!get_kb_item("Host/local_checks_enabled")) audit(AUDIT_LOCAL_CHECKS_NOT_ENABLED);
if (!get_kb_item("Host/Debian/release")) audit(AUDIT_OS_NOT, "Debian");
if (!get_kb_item("Host/Debian/dpkg-l")) audit(AUDIT_PACKAGE_LIST_MISSING);
flag = 0;
if (deb_check(release:"7.0", prefix:"phpmyadmin", reference:"4:3.4.11.1-2+deb7u5")) flag++;
if (flag)
{
if (report_verbosity > 0) security_warning(port:0, extra:deb_report_get());
else security_warning(0);
exit(0);
}
else audit(AUDIT_HOST_NOT, "affected");
{"id": "DEBIAN_DLA-551.NASL", "bulletinFamily": "scanner", "title": "Debian DLA-551-1 : phpmyadmin security update", "description": "Phpmyadmin, a web administration tool for MySQL, had several Cross\nSite Scripting (XSS) vulnerabilities were reported.\n\nCVE-2016-5731\n\nWith a specially crafted request, it is possible to trigger an XSS\nattack through the example OpenID authentication script.\n\nCVE-2016-5733\n\nSeveral XSS vulnerabilities were found with the Transformation\nfeature. Also a vulnerability was reported allowing a specifically-\nconfigured MySQL server to execute an XSS attack. This particular\nattack requires configuring the MySQL server log_bin directive with\nthe payload.\n\nCVE-2016-5739\n\nA vulnerability was reported where a specially crafted Transformation\ncould be used to leak information including the authentication token.\nThis could be used to direct a CSRF attack against a user.\n\nFor Debian 7 'Wheezy', these problems have been fixed in version\n4:3.4.11.1-2+deb7u5.\n\nWe recommend that you upgrade your phpmyadmin packages.\n\nNOTE: Tenable Network Security has extracted the preceding description\nblock directly from the DLA security advisory. Tenable has attempted\nto automatically clean and format it as much as possible without\nintroducing additional issues.", "published": "2016-07-18T00:00:00", "modified": "2016-07-18T00:00:00", "cvss": {"score": 5.0, "vector": "AV:N/AC:L/Au:N/C:P/I:N/A:N"}, "href": "https://www.tenable.com/plugins/nessus/92326", "reporter": "This script is Copyright (C) 2016-2021 and is owned by Tenable, Inc. or an Affiliate thereof.", "references": ["https://lists.debian.org/debian-lts-announce/2016/07/msg00013.html", "https://packages.debian.org/source/wheezy/phpmyadmin"], "cvelist": ["CVE-2016-5731", "CVE-2016-5733", "CVE-2016-5739"], "type": "nessus", "lastseen": "2021-01-12T09:43:53", "edition": 18, "viewCount": 0, "enchantments": {"dependencies": {"references": [{"type": "cve", "idList": ["CVE-2016-5739", "CVE-2016-5731", "CVE-2016-5733"]}, {"type": "debian", "idList": ["DEBIAN:DLA-551-1:E3A98", "DEBIAN:DSA-3627-1:EBE43"]}, {"type": "nessus", "idList": ["OPENSUSE-2016-804.NASL", "DEBIAN_DSA-3627.NASL", "FREEBSD_PKG_E7028E1D3F9B11E681F96805CA0B3D42.NASL", "PHPMYADMIN_4_4_15_7.NASL", "OPENSUSE-2016-806.NASL", "PHPMYADMIN_4_0_10_16.NASL", "GENTOO_GLSA-201701-32.NASL", "PHPMYADMIN_4_6_3.NASL"]}, {"type": "openvas", "idList": ["OPENVAS:1361412562310808496", "OPENVAS:1361412562310808554", "OPENVAS:1361412562310808242", "OPENVAS:1361412562310808562", "OPENVAS:1361412562310703627", "OPENVAS:703627", "OPENVAS:1361412562310808241"]}, {"type": "phpmyadmin", "idList": ["PHPMYADMIN:PMASA-2016-28", "PHPMYADMIN:PMASA-2016-24", "PHPMYADMIN:PMASA-2016-26"]}, {"type": "archlinux", "idList": ["ASA-201606-25"]}, {"type": "freebsd", "idList": ["E7028E1D-3F9B-11E6-81F9-6805CA0B3D42"]}, {"type": "fedora", "idList": ["FEDORA:6380F60652AE", "FEDORA:602076075485", "FEDORA:07C546075B51"]}, {"type": "gentoo", "idList": ["GLSA-201701-32"]}], "modified": "2021-01-12T09:43:53", "rev": 2}, "score": {"value": 5.0, "vector": "NONE", "modified": "2021-01-12T09:43:53", "rev": 2}, "vulnersScore": 5.0}, "sourceData": "#%NASL_MIN_LEVEL 70300\n#\n# (C) Tenable Network Security, Inc.\n#\n# The descriptive text and package checks in this plugin were\n# extracted from Debian Security Advisory DLA-551-1. The text\n# itself is copyright (C) Software in the Public Interest, Inc.\n#\n\ninclude('deprecated_nasl_level.inc');\ninclude('compat.inc');\n\nif (description)\n{\n script_id(92326);\n script_version(\"2.7\");\n script_set_attribute(attribute:\"plugin_modification_date\", value:\"2021/01/11\");\n\n script_cve_id(\"CVE-2016-5731\", \"CVE-2016-5733\", \"CVE-2016-5739\");\n\n script_name(english:\"Debian DLA-551-1 : phpmyadmin security update\");\n script_summary(english:\"Checks dpkg output for the updated package.\");\n\n script_set_attribute(\n attribute:\"synopsis\", \n value:\"The remote Debian host is missing a security update.\"\n );\n script_set_attribute(\n attribute:\"description\", \n value:\n\"Phpmyadmin, a web administration tool for MySQL, had several Cross\nSite Scripting (XSS) vulnerabilities were reported.\n\nCVE-2016-5731\n\nWith a specially crafted request, it is possible to trigger an XSS\nattack through the example OpenID authentication script.\n\nCVE-2016-5733\n\nSeveral XSS vulnerabilities were found with the Transformation\nfeature. Also a vulnerability was reported allowing a specifically-\nconfigured MySQL server to execute an XSS attack. This particular\nattack requires configuring the MySQL server log_bin directive with\nthe payload.\n\nCVE-2016-5739\n\nA vulnerability was reported where a specially crafted Transformation\ncould be used to leak information including the authentication token.\nThis could be used to direct a CSRF attack against a user.\n\nFor Debian 7 'Wheezy', these problems have been fixed in version\n4:3.4.11.1-2+deb7u5.\n\nWe recommend that you upgrade your phpmyadmin packages.\n\nNOTE: Tenable Network Security has extracted the preceding description\nblock directly from the DLA security advisory. Tenable has attempted\nto automatically clean and format it as much as possible without\nintroducing additional issues.\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://lists.debian.org/debian-lts-announce/2016/07/msg00013.html\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://packages.debian.org/source/wheezy/phpmyadmin\"\n );\n script_set_attribute(\n attribute:\"solution\", \n value:\"Upgrade the affected phpmyadmin package.\"\n );\n script_set_cvss_base_vector(\"CVSS2#AV:N/AC:L/Au:N/C:P/I:N/A:N\");\n script_set_cvss_temporal_vector(\"CVSS2#E:U/RL:OF/RC:C\");\n script_set_cvss3_base_vector(\"CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N\");\n script_set_cvss3_temporal_vector(\"CVSS:3.0/E:U/RL:O/RC:C\");\n script_set_attribute(attribute:\"exploitability_ease\", value:\"No known exploits are available\");\n script_set_attribute(attribute:\"exploit_available\", value:\"false\");\n\n script_set_attribute(attribute:\"plugin_type\", value:\"local\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:debian:debian_linux:phpmyadmin\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/o:debian:debian_linux:7.0\");\n\n script_set_attribute(attribute:\"patch_publication_date\", value:\"2016/07/17\");\n script_set_attribute(attribute:\"plugin_publication_date\", value:\"2016/07/18\");\n script_end_attributes();\n\n script_category(ACT_GATHER_INFO);\n script_copyright(english:\"This script is Copyright (C) 2016-2021 and is owned by Tenable, Inc. or an Affiliate thereof.\");\n script_family(english:\"Debian Local Security Checks\");\n\n script_dependencies(\"ssh_get_info.nasl\");\n script_require_keys(\"Host/local_checks_enabled\", \"Host/Debian/release\", \"Host/Debian/dpkg-l\");\n\n exit(0);\n}\n\n\ninclude(\"audit.inc\");\ninclude(\"debian_package.inc\");\n\n\nif (!get_kb_item(\"Host/local_checks_enabled\")) audit(AUDIT_LOCAL_CHECKS_NOT_ENABLED);\nif (!get_kb_item(\"Host/Debian/release\")) audit(AUDIT_OS_NOT, \"Debian\");\nif (!get_kb_item(\"Host/Debian/dpkg-l\")) audit(AUDIT_PACKAGE_LIST_MISSING);\n\n\nflag = 0;\nif (deb_check(release:\"7.0\", prefix:\"phpmyadmin\", reference:\"4:3.4.11.1-2+deb7u5\")) flag++;\n\nif (flag)\n{\n if (report_verbosity > 0) security_warning(port:0, extra:deb_report_get());\n else security_warning(0);\n exit(0);\n}\nelse audit(AUDIT_HOST_NOT, \"affected\");\n", "naslFamily": "Debian Local Security Checks", "pluginID": "92326", "cpe": ["p-cpe:/a:debian:debian_linux:phpmyadmin", "cpe:/o:debian:debian_linux:7.0"], "scheme": null, "cvss3": {"score": 7.5, "vector": "AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N"}}
{"cve": [{"lastseen": "2021-02-02T06:28:09", "description": "Cross-site scripting (XSS) vulnerability in examples/openid.php in phpMyAdmin 4.0.x before 4.0.10.16, 4.4.x before 4.4.15.7, and 4.6.x before 4.6.3 allows remote attackers to inject arbitrary web script or HTML via vectors involving an OpenID error message.", "edition": 4, "cvss3": {"exploitabilityScore": 2.8, "cvssV3": {"baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "attackComplexity": "LOW", "scope": "CHANGED", "attackVector": "NETWORK", "availabilityImpact": "NONE", "integrityImpact": "LOW", "baseScore": 6.1, "privilegesRequired": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N", "userInteraction": "REQUIRED", "version": "3.0"}, "impactScore": 2.7}, "published": "2016-07-03T01:59:00", "title": "CVE-2016-5731", "type": "cve", "cwe": ["CWE-79"], "bulletinFamily": "NVD", "cvss2": {"severity": "MEDIUM", "exploitabilityScore": 8.6, "obtainAllPrivilege": false, "userInteractionRequired": true, "obtainOtherPrivilege": false, "cvssV2": {"accessComplexity": "MEDIUM", "confidentialityImpact": "NONE", "availabilityImpact": "NONE", "integrityImpact": "PARTIAL", "baseScore": 4.3, "vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N", "version": "2.0", "accessVector": "NETWORK", "authentication": "NONE"}, "impactScore": 2.9, "obtainUserPrivilege": false}, "cvelist": ["CVE-2016-5731"], "modified": "2018-10-30T16:27:00", "cpe": ["cpe:/a:phpmyadmin:phpmyadmin:4.0.10.5", "cpe:/a:phpmyadmin:phpmyadmin:4.4.0", "cpe:/a:phpmyadmin:phpmyadmin:4.4.10", "cpe:/a:phpmyadmin:phpmyadmin:4.4.5", "cpe:/a:phpmyadmin:phpmyadmin:4.4.15.2", "cpe:/a:phpmyadmin:phpmyadmin:4.4.2", "cpe:/a:phpmyadmin:phpmyadmin:4.0.10.1", "cpe:/a:phpmyadmin:phpmyadmin:4.4.7", "cpe:/a:phpmyadmin:phpmyadmin:4.4.9", "cpe:/a:phpmyadmin:phpmyadmin:4.0.10.7", "cpe:/a:phpmyadmin:phpmyadmin:4.4.14.1", "cpe:/o:opensuse:opensuse:13.1", "cpe:/a:phpmyadmin:phpmyadmin:4.0.10.4", "cpe:/a:phpmyadmin:phpmyadmin:4.6.1", "cpe:/a:phpmyadmin:phpmyadmin:4.4.15.4", "cpe:/a:phpmyadmin:phpmyadmin:4.0.5", "cpe:/a:phpmyadmin:phpmyadmin:4.0.10.13", "cpe:/a:phpmyadmin:phpmyadmin:4.4.15.5", "cpe:/a:phpmyadmin:phpmyadmin:4.6.0", "cpe:/a:phpmyadmin:phpmyadmin:4.0.10.11", "cpe:/a:phpmyadmin:phpmyadmin:4.0.10.3", "cpe:/a:phpmyadmin:phpmyadmin:4.4.1", "cpe:/a:phpmyadmin:phpmyadmin:4.0.10.9", "cpe:/a:phpmyadmin:phpmyadmin:4.0.6", "cpe:/a:phpmyadmin:phpmyadmin:4.0.2", "cpe:/a:phpmyadmin:phpmyadmin:4.4.15", "cpe:/a:phpmyadmin:phpmyadmin:4.0.9", "cpe:/a:phpmyadmin:phpmyadmin:4.0.10.15", "cpe:/a:phpmyadmin:phpmyadmin:4.4.13", "cpe:/a:phpmyadmin:phpmyadmin:4.4.15.6", "cpe:/a:phpmyadmin:phpmyadmin:4.4.1.1", "cpe:/o:opensuse:opensuse:13.2", "cpe:/a:phpmyadmin:phpmyadmin:4.0.8", "cpe:/a:phpmyadmin:phpmyadmin:4.0.4", "cpe:/a:phpmyadmin:phpmyadmin:4.0.4.2", "cpe:/a:phpmyadmin:phpmyadmin:4.4.8", "cpe:/a:phpmyadmin:phpmyadmin:4.4.15.1", "cpe:/a:phpmyadmin:phpmyadmin:4.4.3", "cpe:/o:opensuse:leap:42.1", "cpe:/a:phpmyadmin:phpmyadmin:4.0.10.10", "cpe:/a:phpmyadmin:phpmyadmin:4.0.10.12", "cpe:/a:phpmyadmin:phpmyadmin:4.0.1", "cpe:/a:phpmyadmin:phpmyadmin:4.0.10", "cpe:/a:phpmyadmin:phpmyadmin:4.0.7", "cpe:/a:phpmyadmin:phpmyadmin:4.4.15.3", "cpe:/a:phpmyadmin:phpmyadmin:4.0.10.8", "cpe:/a:phpmyadmin:phpmyadmin:4.4.6", "cpe:/a:phpmyadmin:phpmyadmin:4.0.10.6", "cpe:/a:phpmyadmin:phpmyadmin:4.4.12", "cpe:/a:phpmyadmin:phpmyadmin:4.0.0", "cpe:/a:phpmyadmin:phpmyadmin:4.0.10.2", "cpe:/a:phpmyadmin:phpmyadmin:4.6.2", "cpe:/a:phpmyadmin:phpmyadmin:4.0.10.14", "cpe:/a:phpmyadmin:phpmyadmin:4.4.6.1", "cpe:/a:phpmyadmin:phpmyadmin:4.0.4.1", "cpe:/a:phpmyadmin:phpmyadmin:4.4.4", "cpe:/a:phpmyadmin:phpmyadmin:4.0.3", "cpe:/a:phpmyadmin:phpmyadmin:4.4.11", "cpe:/a:phpmyadmin:phpmyadmin:4.4.13.1"], "id": "CVE-2016-5731", "href": "https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2016-5731", "cvss": {"score": 4.3, "vector": "AV:N/AC:M/Au:N/C:N/I:P/A:N"}, "cpe23": ["cpe:2.3:a:phpmyadmin:phpmyadmin:4.4.7:*:*:*:*:*:*:*", "cpe:2.3:a:phpmyadmin:phpmyadmin:4.4.5:*:*:*:*:*:*:*", "cpe:2.3:a:phpmyadmin:phpmyadmin:4.0.1:*:*:*:*:*:*:*", "cpe:2.3:a:phpmyadmin:phpmyadmin:4.4.12:*:*:*:*:*:*:*", "cpe:2.3:a:phpmyadmin:phpmyadmin:4.0.10.13:*:*:*:*:*:*:*", "cpe:2.3:a:phpmyadmin:phpmyadmin:4.0.10.3:*:*:*:*:*:*:*", "cpe:2.3:a:phpmyadmin:phpmyadmin:4.0.10.7:*:*:*:*:*:*:*", "cpe:2.3:a:phpmyadmin:phpmyadmin:4.4.0:*:*:*:*:*:*:*", "cpe:2.3:a:phpmyadmin:phpmyadmin:4.4.11:*:*:*:*:*:*:*", "cpe:2.3:a:phpmyadmin:phpmyadmin:4.4.6.1:*:*:*:*:*:*:*", "cpe:2.3:a:phpmyadmin:phpmyadmin:4.4.15.1:*:*:*:*:*:*:*", "cpe:2.3:o:opensuse:opensuse:13.1:*:*:*:*:*:*:*", "cpe:2.3:a:phpmyadmin:phpmyadmin:4.0.10.2:*:*:*:*:*:*:*", "cpe:2.3:a:phpmyadmin:phpmyadmin:4.0.10.10:*:*:*:*:*:*:*", "cpe:2.3:a:phpmyadmin:phpmyadmin:4.4.8:*:*:*:*:*:*:*", "cpe:2.3:a:phpmyadmin:phpmyadmin:4.0.10.4:*:*:*:*:*:*:*", "cpe:2.3:a:phpmyadmin:phpmyadmin:4.4.4:*:*:*:*:*:*:*", "cpe:2.3:a:phpmyadmin:phpmyadmin:4.4.15.2:*:*:*:*:*:*:*", "cpe:2.3:a:phpmyadmin:phpmyadmin:4.4.6:*:*:*:*:*:*:*", "cpe:2.3:a:phpmyadmin:phpmyadmin:4.0.10.6:*:*:*:*:*:*:*", "cpe:2.3:a:phpmyadmin:phpmyadmin:4.0.10.9:*:*:*:*:*:*:*", "cpe:2.3:a:phpmyadmin:phpmyadmin:4.4.3:*:*:*:*:*:*:*", "cpe:2.3:a:phpmyadmin:phpmyadmin:4.0.3:*:*:*:*:*:*:*", "cpe:2.3:a:phpmyadmin:phpmyadmin:4.4.15.4:*:*:*:*:*:*:*", "cpe:2.3:a:phpmyadmin:phpmyadmin:4.4.15:*:*:*:*:*:*:*", "cpe:2.3:a:phpmyadmin:phpmyadmin:4.6.0:rc1:*:*:*:*:*:*", "cpe:2.3:a:phpmyadmin:phpmyadmin:4.4.10:*:*:*:*:*:*:*", "cpe:2.3:a:phpmyadmin:phpmyadmin:4.4.13:*:*:*:*:*:*:*", "cpe:2.3:a:phpmyadmin:phpmyadmin:4.4.1:*:*:*:*:*:*:*", "cpe:2.3:a:phpmyadmin:phpmyadmin:4.6.1:*:*:*:*:*:*:*", "cpe:2.3:a:phpmyadmin:phpmyadmin:4.0.4.1:*:*:*:*:*:*:*", "cpe:2.3:a:phpmyadmin:phpmyadmin:4.0.7:*:*:*:*:*:*:*", "cpe:2.3:a:phpmyadmin:phpmyadmin:4.0.0:*:*:*:*:*:*:*", "cpe:2.3:a:phpmyadmin:phpmyadmin:4.6.0:rc2:*:*:*:*:*:*", "cpe:2.3:a:phpmyadmin:phpmyadmin:4.0.5:*:*:*:*:*:*:*", "cpe:2.3:a:phpmyadmin:phpmyadmin:4.4.13.1:*:*:*:*:*:*:*", "cpe:2.3:a:phpmyadmin:phpmyadmin:4.0.10.12:*:*:*:*:*:*:*", "cpe:2.3:a:phpmyadmin:phpmyadmin:4.0.10.15:*:*:*:*:*:*:*", "cpe:2.3:a:phpmyadmin:phpmyadmin:4.4.14.1:*:*:*:*:*:*:*", "cpe:2.3:a:phpmyadmin:phpmyadmin:4.4.9:*:*:*:*:*:*:*", "cpe:2.3:o:opensuse:opensuse:13.2:*:*:*:*:*:*:*", "cpe:2.3:a:phpmyadmin:phpmyadmin:4.6.0:alpha1:*:*:*:*:*:*", "cpe:2.3:a:phpmyadmin:phpmyadmin:4.0.8:*:*:*:*:*:*:*", "cpe:2.3:a:phpmyadmin:phpmyadmin:4.0.10.1:*:*:*:*:*:*:*", "cpe:2.3:a:phpmyadmin:phpmyadmin:4.0.6:*:*:*:*:*:*:*", "cpe:2.3:a:phpmyadmin:phpmyadmin:4.6.2:*:*:*:*:*:*:*", "cpe:2.3:a:phpmyadmin:phpmyadmin:4.6.0:*:*:*:*:*:*:*", "cpe:2.3:a:phpmyadmin:phpmyadmin:4.0.10:*:*:*:*:*:*:*", "cpe:2.3:a:phpmyadmin:phpmyadmin:4.0.2:*:*:*:*:*:*:*", "cpe:2.3:a:phpmyadmin:phpmyadmin:4.0.10.8:*:*:*:*:*:*:*", "cpe:2.3:a:phpmyadmin:phpmyadmin:4.4.15.3:*:*:*:*:*:*:*", "cpe:2.3:a:phpmyadmin:phpmyadmin:4.4.2:*:*:*:*:*:*:*", "cpe:2.3:a:phpmyadmin:phpmyadmin:4.4.15.6:*:*:*:*:*:*:*", "cpe:2.3:a:phpmyadmin:phpmyadmin:4.4.15.5:*:*:*:*:*:*:*", "cpe:2.3:a:phpmyadmin:phpmyadmin:4.0.4:*:*:*:*:*:*:*", "cpe:2.3:a:phpmyadmin:phpmyadmin:4.0.10.14:*:*:*:*:*:*:*", "cpe:2.3:a:phpmyadmin:phpmyadmin:4.0.9:*:*:*:*:*:*:*", "cpe:2.3:a:phpmyadmin:phpmyadmin:4.0.10.11:*:*:*:*:*:*:*", "cpe:2.3:o:opensuse:leap:42.1:*:*:*:*:*:*:*", "cpe:2.3:a:phpmyadmin:phpmyadmin:4.4.1.1:*:*:*:*:*:*:*", "cpe:2.3:a:phpmyadmin:phpmyadmin:4.0.4.2:*:*:*:*:*:*:*", "cpe:2.3:a:phpmyadmin:phpmyadmin:4.0.10.5:*:*:*:*:*:*:*"]}, {"lastseen": "2021-02-02T06:28:09", "description": "The Transformation implementation in phpMyAdmin 4.0.x before 4.0.10.16, 4.4.x before 4.4.15.7, and 4.6.x before 4.6.3 does not use the no-referrer Content Security Policy (CSP) protection mechanism, which makes it easier for remote attackers to conduct CSRF attacks by reading an authentication token in a Referer header, related to libraries/Header.php.", "edition": 4, "cvss3": {"exploitabilityScore": 3.9, "cvssV3": {"baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "attackComplexity": "LOW", "scope": "UNCHANGED", "attackVector": "NETWORK", "availabilityImpact": "NONE", "integrityImpact": "NONE", "baseScore": 7.5, "privilegesRequired": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", "userInteraction": "NONE", "version": "3.0"}, "impactScore": 3.6}, "published": "2016-07-03T01:59:00", "title": "CVE-2016-5739", "type": "cve", "cwe": ["CWE-200"], "bulletinFamily": "NVD", "cvss2": {"severity": "MEDIUM", "exploitabilityScore": 10.0, "obtainAllPrivilege": false, "userInteractionRequired": false, "obtainOtherPrivilege": false, "cvssV2": {"accessComplexity": "LOW", "confidentialityImpact": "PARTIAL", "availabilityImpact": "NONE", "integrityImpact": "NONE", "baseScore": 5.0, "vectorString": "AV:N/AC:L/Au:N/C:P/I:N/A:N", "version": "2.0", "accessVector": "NETWORK", "authentication": "NONE"}, "impactScore": 2.9, "obtainUserPrivilege": false}, "cvelist": ["CVE-2016-5739"], "modified": "2018-10-30T16:27:00", "cpe": ["cpe:/a:phpmyadmin:phpmyadmin:4.0.10.5", "cpe:/a:phpmyadmin:phpmyadmin:4.4.0", "cpe:/a:phpmyadmin:phpmyadmin:4.4.10", "cpe:/a:phpmyadmin:phpmyadmin:4.4.5", "cpe:/a:phpmyadmin:phpmyadmin:4.4.15.2", "cpe:/a:phpmyadmin:phpmyadmin:4.4.2", "cpe:/a:phpmyadmin:phpmyadmin:4.0.10.1", "cpe:/a:phpmyadmin:phpmyadmin:4.4.7", "cpe:/a:phpmyadmin:phpmyadmin:4.4.9", "cpe:/a:phpmyadmin:phpmyadmin:4.0.10.7", "cpe:/a:phpmyadmin:phpmyadmin:4.4.14.1", "cpe:/o:opensuse:opensuse:13.1", "cpe:/a:phpmyadmin:phpmyadmin:4.0.10.4", "cpe:/a:phpmyadmin:phpmyadmin:4.6.1", "cpe:/a:phpmyadmin:phpmyadmin:4.4.15.4", "cpe:/a:phpmyadmin:phpmyadmin:4.0.5", "cpe:/a:phpmyadmin:phpmyadmin:4.0.10.13", "cpe:/a:phpmyadmin:phpmyadmin:4.4.15.5", "cpe:/a:phpmyadmin:phpmyadmin:4.6.0", "cpe:/a:phpmyadmin:phpmyadmin:4.0.10.11", "cpe:/a:phpmyadmin:phpmyadmin:4.0.10.3", "cpe:/a:phpmyadmin:phpmyadmin:4.4.1", "cpe:/a:phpmyadmin:phpmyadmin:4.0.10.9", "cpe:/a:phpmyadmin:phpmyadmin:4.0.6", "cpe:/a:phpmyadmin:phpmyadmin:4.0.2", "cpe:/a:phpmyadmin:phpmyadmin:4.4.15", "cpe:/a:phpmyadmin:phpmyadmin:4.0.9", "cpe:/a:phpmyadmin:phpmyadmin:4.0.10.15", "cpe:/a:phpmyadmin:phpmyadmin:4.4.13", "cpe:/a:phpmyadmin:phpmyadmin:4.4.15.6", "cpe:/a:phpmyadmin:phpmyadmin:4.4.1.1", "cpe:/o:opensuse:opensuse:13.2", "cpe:/a:phpmyadmin:phpmyadmin:4.0.8", "cpe:/a:phpmyadmin:phpmyadmin:4.0.4", "cpe:/a:phpmyadmin:phpmyadmin:4.0.4.2", "cpe:/a:phpmyadmin:phpmyadmin:4.4.8", "cpe:/a:phpmyadmin:phpmyadmin:4.4.15.1", "cpe:/a:phpmyadmin:phpmyadmin:4.4.3", "cpe:/o:opensuse:leap:42.1", "cpe:/a:phpmyadmin:phpmyadmin:4.0.10.10", "cpe:/a:phpmyadmin:phpmyadmin:4.0.10.12", "cpe:/a:phpmyadmin:phpmyadmin:4.0.1", "cpe:/a:phpmyadmin:phpmyadmin:4.0.10", "cpe:/a:phpmyadmin:phpmyadmin:4.0.7", "cpe:/a:phpmyadmin:phpmyadmin:4.4.15.3", "cpe:/a:phpmyadmin:phpmyadmin:4.0.10.8", "cpe:/a:phpmyadmin:phpmyadmin:4.4.6", "cpe:/a:phpmyadmin:phpmyadmin:4.0.10.6", "cpe:/a:phpmyadmin:phpmyadmin:4.4.12", "cpe:/a:phpmyadmin:phpmyadmin:4.0.0", "cpe:/a:phpmyadmin:phpmyadmin:4.0.10.2", "cpe:/a:phpmyadmin:phpmyadmin:4.6.2", "cpe:/a:phpmyadmin:phpmyadmin:4.0.10.14", "cpe:/a:phpmyadmin:phpmyadmin:4.4.6.1", "cpe:/a:phpmyadmin:phpmyadmin:4.0.4.1", "cpe:/a:phpmyadmin:phpmyadmin:4.4.4", "cpe:/a:phpmyadmin:phpmyadmin:4.0.3", "cpe:/a:phpmyadmin:phpmyadmin:4.4.11", "cpe:/a:phpmyadmin:phpmyadmin:4.4.13.1"], "id": "CVE-2016-5739", "href": "https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2016-5739", "cvss": {"score": 5.0, "vector": "AV:N/AC:L/Au:N/C:P/I:N/A:N"}, "cpe23": ["cpe:2.3:a:phpmyadmin:phpmyadmin:4.4.7:*:*:*:*:*:*:*", "cpe:2.3:a:phpmyadmin:phpmyadmin:4.4.5:*:*:*:*:*:*:*", "cpe:2.3:a:phpmyadmin:phpmyadmin:4.0.1:*:*:*:*:*:*:*", "cpe:2.3:a:phpmyadmin:phpmyadmin:4.4.12:*:*:*:*:*:*:*", "cpe:2.3:a:phpmyadmin:phpmyadmin:4.0.10.13:*:*:*:*:*:*:*", "cpe:2.3:a:phpmyadmin:phpmyadmin:4.0.10.3:*:*:*:*:*:*:*", "cpe:2.3:a:phpmyadmin:phpmyadmin:4.0.10.7:*:*:*:*:*:*:*", "cpe:2.3:a:phpmyadmin:phpmyadmin:4.4.0:*:*:*:*:*:*:*", "cpe:2.3:a:phpmyadmin:phpmyadmin:4.4.11:*:*:*:*:*:*:*", "cpe:2.3:a:phpmyadmin:phpmyadmin:4.4.6.1:*:*:*:*:*:*:*", "cpe:2.3:a:phpmyadmin:phpmyadmin:4.4.15.1:*:*:*:*:*:*:*", "cpe:2.3:o:opensuse:opensuse:13.1:*:*:*:*:*:*:*", "cpe:2.3:a:phpmyadmin:phpmyadmin:4.0.10.2:*:*:*:*:*:*:*", "cpe:2.3:a:phpmyadmin:phpmyadmin:4.0.10.10:*:*:*:*:*:*:*", "cpe:2.3:a:phpmyadmin:phpmyadmin:4.4.8:*:*:*:*:*:*:*", "cpe:2.3:a:phpmyadmin:phpmyadmin:4.0.10.4:*:*:*:*:*:*:*", "cpe:2.3:a:phpmyadmin:phpmyadmin:4.4.4:*:*:*:*:*:*:*", "cpe:2.3:a:phpmyadmin:phpmyadmin:4.4.15.2:*:*:*:*:*:*:*", "cpe:2.3:a:phpmyadmin:phpmyadmin:4.4.6:*:*:*:*:*:*:*", "cpe:2.3:a:phpmyadmin:phpmyadmin:4.0.10.6:*:*:*:*:*:*:*", "cpe:2.3:a:phpmyadmin:phpmyadmin:4.0.10.9:*:*:*:*:*:*:*", "cpe:2.3:a:phpmyadmin:phpmyadmin:4.4.3:*:*:*:*:*:*:*", "cpe:2.3:a:phpmyadmin:phpmyadmin:4.0.3:*:*:*:*:*:*:*", "cpe:2.3:a:phpmyadmin:phpmyadmin:4.4.15.4:*:*:*:*:*:*:*", "cpe:2.3:a:phpmyadmin:phpmyadmin:4.4.15:*:*:*:*:*:*:*", "cpe:2.3:a:phpmyadmin:phpmyadmin:4.6.0:rc1:*:*:*:*:*:*", "cpe:2.3:a:phpmyadmin:phpmyadmin:4.4.10:*:*:*:*:*:*:*", "cpe:2.3:a:phpmyadmin:phpmyadmin:4.4.13:*:*:*:*:*:*:*", "cpe:2.3:a:phpmyadmin:phpmyadmin:4.4.1:*:*:*:*:*:*:*", "cpe:2.3:a:phpmyadmin:phpmyadmin:4.6.1:*:*:*:*:*:*:*", "cpe:2.3:a:phpmyadmin:phpmyadmin:4.0.4.1:*:*:*:*:*:*:*", "cpe:2.3:a:phpmyadmin:phpmyadmin:4.0.7:*:*:*:*:*:*:*", "cpe:2.3:a:phpmyadmin:phpmyadmin:4.0.0:*:*:*:*:*:*:*", "cpe:2.3:a:phpmyadmin:phpmyadmin:4.6.0:rc2:*:*:*:*:*:*", "cpe:2.3:a:phpmyadmin:phpmyadmin:4.0.5:*:*:*:*:*:*:*", "cpe:2.3:a:phpmyadmin:phpmyadmin:4.4.13.1:*:*:*:*:*:*:*", "cpe:2.3:a:phpmyadmin:phpmyadmin:4.0.10.12:*:*:*:*:*:*:*", "cpe:2.3:a:phpmyadmin:phpmyadmin:4.0.10.15:*:*:*:*:*:*:*", "cpe:2.3:a:phpmyadmin:phpmyadmin:4.4.14.1:*:*:*:*:*:*:*", "cpe:2.3:a:phpmyadmin:phpmyadmin:4.4.9:*:*:*:*:*:*:*", "cpe:2.3:o:opensuse:opensuse:13.2:*:*:*:*:*:*:*", "cpe:2.3:a:phpmyadmin:phpmyadmin:4.6.0:alpha1:*:*:*:*:*:*", "cpe:2.3:a:phpmyadmin:phpmyadmin:4.0.8:*:*:*:*:*:*:*", "cpe:2.3:a:phpmyadmin:phpmyadmin:4.0.10.1:*:*:*:*:*:*:*", "cpe:2.3:a:phpmyadmin:phpmyadmin:4.0.6:*:*:*:*:*:*:*", "cpe:2.3:a:phpmyadmin:phpmyadmin:4.6.2:*:*:*:*:*:*:*", "cpe:2.3:a:phpmyadmin:phpmyadmin:4.6.0:*:*:*:*:*:*:*", "cpe:2.3:a:phpmyadmin:phpmyadmin:4.0.10:*:*:*:*:*:*:*", "cpe:2.3:a:phpmyadmin:phpmyadmin:4.0.2:*:*:*:*:*:*:*", "cpe:2.3:a:phpmyadmin:phpmyadmin:4.0.10.8:*:*:*:*:*:*:*", "cpe:2.3:a:phpmyadmin:phpmyadmin:4.4.15.3:*:*:*:*:*:*:*", "cpe:2.3:a:phpmyadmin:phpmyadmin:4.4.2:*:*:*:*:*:*:*", "cpe:2.3:a:phpmyadmin:phpmyadmin:4.4.15.6:*:*:*:*:*:*:*", "cpe:2.3:a:phpmyadmin:phpmyadmin:4.4.15.5:*:*:*:*:*:*:*", "cpe:2.3:a:phpmyadmin:phpmyadmin:4.0.4:*:*:*:*:*:*:*", "cpe:2.3:a:phpmyadmin:phpmyadmin:4.0.10.14:*:*:*:*:*:*:*", "cpe:2.3:a:phpmyadmin:phpmyadmin:4.0.9:*:*:*:*:*:*:*", "cpe:2.3:a:phpmyadmin:phpmyadmin:4.0.10.11:*:*:*:*:*:*:*", "cpe:2.3:o:opensuse:leap:42.1:*:*:*:*:*:*:*", "cpe:2.3:a:phpmyadmin:phpmyadmin:4.4.1.1:*:*:*:*:*:*:*", "cpe:2.3:a:phpmyadmin:phpmyadmin:4.0.4.2:*:*:*:*:*:*:*", "cpe:2.3:a:phpmyadmin:phpmyadmin:4.0.10.5:*:*:*:*:*:*:*"]}, {"lastseen": "2021-02-02T06:28:09", "description": "Multiple cross-site scripting (XSS) vulnerabilities in phpMyAdmin 4.0.x before 4.0.10.16, 4.4.x before 4.4.15.7, and 4.6.x before 4.6.3 allow remote attackers to inject arbitrary web script or HTML via vectors involving (1) a crafted table name that is mishandled during privilege checking in table_row.phtml, (2) a crafted mysqld log_bin directive that is mishandled in log_selector.phtml, (3) the Transformation implementation, (4) AJAX error handling in js/ajax.js, (5) the Designer implementation, (6) the charts implementation in js/tbl_chart.js, or (7) the zoom-search implementation in rows_zoom.phtml.", "edition": 4, "cvss3": {"exploitabilityScore": 2.8, "cvssV3": {"baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "attackComplexity": "LOW", "scope": "CHANGED", "attackVector": "NETWORK", "availabilityImpact": "NONE", "integrityImpact": "LOW", "baseScore": 6.1, "privilegesRequired": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N", "userInteraction": "REQUIRED", "version": "3.0"}, "impactScore": 2.7}, "published": "2016-07-03T01:59:00", "title": "CVE-2016-5733", "type": "cve", "cwe": ["CWE-79"], "bulletinFamily": "NVD", "cvss2": {"severity": "MEDIUM", "exploitabilityScore": 8.6, "obtainAllPrivilege": false, "userInteractionRequired": true, "obtainOtherPrivilege": false, "cvssV2": {"accessComplexity": "MEDIUM", "confidentialityImpact": "NONE", "availabilityImpact": "NONE", "integrityImpact": "PARTIAL", "baseScore": 4.3, "vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N", "version": "2.0", "accessVector": "NETWORK", "authentication": "NONE"}, "impactScore": 2.9, "obtainUserPrivilege": false}, "cvelist": ["CVE-2016-5733"], "modified": "2018-10-30T16:27:00", "cpe": ["cpe:/a:phpmyadmin:phpmyadmin:4.0.10.5", "cpe:/a:phpmyadmin:phpmyadmin:4.4.0", "cpe:/a:phpmyadmin:phpmyadmin:4.4.10", "cpe:/a:phpmyadmin:phpmyadmin:4.4.5", "cpe:/a:phpmyadmin:phpmyadmin:4.4.15.2", "cpe:/a:phpmyadmin:phpmyadmin:4.4.2", "cpe:/a:phpmyadmin:phpmyadmin:4.0.10.1", "cpe:/a:phpmyadmin:phpmyadmin:4.4.7", "cpe:/a:phpmyadmin:phpmyadmin:4.4.9", "cpe:/a:phpmyadmin:phpmyadmin:4.0.10.7", "cpe:/a:phpmyadmin:phpmyadmin:4.4.14.1", "cpe:/o:opensuse:opensuse:13.1", "cpe:/a:phpmyadmin:phpmyadmin:4.0.10.4", "cpe:/a:phpmyadmin:phpmyadmin:4.6.1", "cpe:/a:phpmyadmin:phpmyadmin:4.4.15.4", "cpe:/a:phpmyadmin:phpmyadmin:4.0.5", "cpe:/a:phpmyadmin:phpmyadmin:4.0.10.13", "cpe:/a:phpmyadmin:phpmyadmin:4.4.15.5", "cpe:/a:phpmyadmin:phpmyadmin:4.6.0", "cpe:/a:phpmyadmin:phpmyadmin:4.0.10.11", "cpe:/a:phpmyadmin:phpmyadmin:4.0.10.3", "cpe:/a:phpmyadmin:phpmyadmin:4.4.1", "cpe:/a:phpmyadmin:phpmyadmin:4.0.10.9", "cpe:/a:phpmyadmin:phpmyadmin:4.0.6", "cpe:/a:phpmyadmin:phpmyadmin:4.0.2", "cpe:/a:phpmyadmin:phpmyadmin:4.4.15", "cpe:/a:phpmyadmin:phpmyadmin:4.0.9", "cpe:/a:phpmyadmin:phpmyadmin:4.0.10.15", "cpe:/a:phpmyadmin:phpmyadmin:4.4.13", "cpe:/a:phpmyadmin:phpmyadmin:4.4.15.6", "cpe:/a:phpmyadmin:phpmyadmin:4.4.1.1", "cpe:/o:opensuse:opensuse:13.2", "cpe:/a:phpmyadmin:phpmyadmin:4.0.8", "cpe:/a:phpmyadmin:phpmyadmin:4.0.4", "cpe:/a:phpmyadmin:phpmyadmin:4.0.4.2", "cpe:/a:phpmyadmin:phpmyadmin:4.4.8", "cpe:/a:phpmyadmin:phpmyadmin:4.4.15.1", "cpe:/a:phpmyadmin:phpmyadmin:4.4.3", "cpe:/o:opensuse:leap:42.1", "cpe:/a:phpmyadmin:phpmyadmin:4.0.10.10", "cpe:/a:phpmyadmin:phpmyadmin:4.0.10.12", "cpe:/a:phpmyadmin:phpmyadmin:4.0.1", "cpe:/a:phpmyadmin:phpmyadmin:4.0.10", "cpe:/a:phpmyadmin:phpmyadmin:4.0.7", "cpe:/a:phpmyadmin:phpmyadmin:4.4.15.3", "cpe:/a:phpmyadmin:phpmyadmin:4.0.10.8", "cpe:/a:phpmyadmin:phpmyadmin:4.4.6", "cpe:/a:phpmyadmin:phpmyadmin:4.0.10.6", "cpe:/a:phpmyadmin:phpmyadmin:4.4.12", "cpe:/a:phpmyadmin:phpmyadmin:4.0.0", "cpe:/a:phpmyadmin:phpmyadmin:4.0.10.2", "cpe:/a:phpmyadmin:phpmyadmin:4.6.2", "cpe:/a:phpmyadmin:phpmyadmin:4.0.10.14", "cpe:/a:phpmyadmin:phpmyadmin:4.4.6.1", "cpe:/a:phpmyadmin:phpmyadmin:4.0.4.1", "cpe:/a:phpmyadmin:phpmyadmin:4.4.4", "cpe:/a:phpmyadmin:phpmyadmin:4.0.3", "cpe:/a:phpmyadmin:phpmyadmin:4.4.11", "cpe:/a:phpmyadmin:phpmyadmin:4.4.13.1"], "id": "CVE-2016-5733", "href": "https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2016-5733", "cvss": {"score": 4.3, "vector": "AV:N/AC:M/Au:N/C:N/I:P/A:N"}, "cpe23": ["cpe:2.3:a:phpmyadmin:phpmyadmin:4.4.7:*:*:*:*:*:*:*", "cpe:2.3:a:phpmyadmin:phpmyadmin:4.4.5:*:*:*:*:*:*:*", "cpe:2.3:a:phpmyadmin:phpmyadmin:4.0.1:*:*:*:*:*:*:*", "cpe:2.3:a:phpmyadmin:phpmyadmin:4.4.12:*:*:*:*:*:*:*", "cpe:2.3:a:phpmyadmin:phpmyadmin:4.0.10.13:*:*:*:*:*:*:*", "cpe:2.3:a:phpmyadmin:phpmyadmin:4.0.10.3:*:*:*:*:*:*:*", "cpe:2.3:a:phpmyadmin:phpmyadmin:4.0.10.7:*:*:*:*:*:*:*", "cpe:2.3:a:phpmyadmin:phpmyadmin:4.4.0:*:*:*:*:*:*:*", "cpe:2.3:a:phpmyadmin:phpmyadmin:4.4.11:*:*:*:*:*:*:*", "cpe:2.3:a:phpmyadmin:phpmyadmin:4.4.6.1:*:*:*:*:*:*:*", "cpe:2.3:a:phpmyadmin:phpmyadmin:4.4.15.1:*:*:*:*:*:*:*", "cpe:2.3:o:opensuse:opensuse:13.1:*:*:*:*:*:*:*", "cpe:2.3:a:phpmyadmin:phpmyadmin:4.0.10.2:*:*:*:*:*:*:*", "cpe:2.3:a:phpmyadmin:phpmyadmin:4.0.10.10:*:*:*:*:*:*:*", "cpe:2.3:a:phpmyadmin:phpmyadmin:4.4.8:*:*:*:*:*:*:*", "cpe:2.3:a:phpmyadmin:phpmyadmin:4.0.10.4:*:*:*:*:*:*:*", "cpe:2.3:a:phpmyadmin:phpmyadmin:4.4.4:*:*:*:*:*:*:*", "cpe:2.3:a:phpmyadmin:phpmyadmin:4.4.15.2:*:*:*:*:*:*:*", "cpe:2.3:a:phpmyadmin:phpmyadmin:4.4.6:*:*:*:*:*:*:*", "cpe:2.3:a:phpmyadmin:phpmyadmin:4.0.10.6:*:*:*:*:*:*:*", "cpe:2.3:a:phpmyadmin:phpmyadmin:4.0.10.9:*:*:*:*:*:*:*", "cpe:2.3:a:phpmyadmin:phpmyadmin:4.4.3:*:*:*:*:*:*:*", "cpe:2.3:a:phpmyadmin:phpmyadmin:4.0.3:*:*:*:*:*:*:*", "cpe:2.3:a:phpmyadmin:phpmyadmin:4.4.15.4:*:*:*:*:*:*:*", "cpe:2.3:a:phpmyadmin:phpmyadmin:4.4.15:*:*:*:*:*:*:*", "cpe:2.3:a:phpmyadmin:phpmyadmin:4.6.0:rc1:*:*:*:*:*:*", "cpe:2.3:a:phpmyadmin:phpmyadmin:4.4.10:*:*:*:*:*:*:*", "cpe:2.3:a:phpmyadmin:phpmyadmin:4.4.13:*:*:*:*:*:*:*", "cpe:2.3:a:phpmyadmin:phpmyadmin:4.4.1:*:*:*:*:*:*:*", "cpe:2.3:a:phpmyadmin:phpmyadmin:4.6.1:*:*:*:*:*:*:*", "cpe:2.3:a:phpmyadmin:phpmyadmin:4.0.4.1:*:*:*:*:*:*:*", "cpe:2.3:a:phpmyadmin:phpmyadmin:4.0.7:*:*:*:*:*:*:*", "cpe:2.3:a:phpmyadmin:phpmyadmin:4.0.0:*:*:*:*:*:*:*", "cpe:2.3:a:phpmyadmin:phpmyadmin:4.6.0:rc2:*:*:*:*:*:*", "cpe:2.3:a:phpmyadmin:phpmyadmin:4.0.5:*:*:*:*:*:*:*", "cpe:2.3:a:phpmyadmin:phpmyadmin:4.4.13.1:*:*:*:*:*:*:*", "cpe:2.3:a:phpmyadmin:phpmyadmin:4.0.10.12:*:*:*:*:*:*:*", "cpe:2.3:a:phpmyadmin:phpmyadmin:4.0.10.15:*:*:*:*:*:*:*", "cpe:2.3:a:phpmyadmin:phpmyadmin:4.4.14.1:*:*:*:*:*:*:*", "cpe:2.3:a:phpmyadmin:phpmyadmin:4.4.9:*:*:*:*:*:*:*", "cpe:2.3:o:opensuse:opensuse:13.2:*:*:*:*:*:*:*", "cpe:2.3:a:phpmyadmin:phpmyadmin:4.6.0:alpha1:*:*:*:*:*:*", "cpe:2.3:a:phpmyadmin:phpmyadmin:4.0.8:*:*:*:*:*:*:*", "cpe:2.3:a:phpmyadmin:phpmyadmin:4.0.10.1:*:*:*:*:*:*:*", "cpe:2.3:a:phpmyadmin:phpmyadmin:4.0.6:*:*:*:*:*:*:*", "cpe:2.3:a:phpmyadmin:phpmyadmin:4.6.2:*:*:*:*:*:*:*", "cpe:2.3:a:phpmyadmin:phpmyadmin:4.6.0:*:*:*:*:*:*:*", "cpe:2.3:a:phpmyadmin:phpmyadmin:4.0.10:*:*:*:*:*:*:*", "cpe:2.3:a:phpmyadmin:phpmyadmin:4.0.2:*:*:*:*:*:*:*", "cpe:2.3:a:phpmyadmin:phpmyadmin:4.0.10.8:*:*:*:*:*:*:*", "cpe:2.3:a:phpmyadmin:phpmyadmin:4.4.15.3:*:*:*:*:*:*:*", "cpe:2.3:a:phpmyadmin:phpmyadmin:4.4.2:*:*:*:*:*:*:*", "cpe:2.3:a:phpmyadmin:phpmyadmin:4.4.15.6:*:*:*:*:*:*:*", "cpe:2.3:a:phpmyadmin:phpmyadmin:4.4.15.5:*:*:*:*:*:*:*", "cpe:2.3:a:phpmyadmin:phpmyadmin:4.0.4:*:*:*:*:*:*:*", "cpe:2.3:a:phpmyadmin:phpmyadmin:4.0.10.14:*:*:*:*:*:*:*", "cpe:2.3:a:phpmyadmin:phpmyadmin:4.0.9:*:*:*:*:*:*:*", "cpe:2.3:a:phpmyadmin:phpmyadmin:4.0.10.11:*:*:*:*:*:*:*", "cpe:2.3:o:opensuse:leap:42.1:*:*:*:*:*:*:*", "cpe:2.3:a:phpmyadmin:phpmyadmin:4.4.1.1:*:*:*:*:*:*:*", "cpe:2.3:a:phpmyadmin:phpmyadmin:4.0.4.2:*:*:*:*:*:*:*", "cpe:2.3:a:phpmyadmin:phpmyadmin:4.0.10.5:*:*:*:*:*:*:*"]}], "debian": [{"lastseen": "2019-05-30T02:22:09", "bulletinFamily": "unix", "cvelist": ["CVE-2016-5731", "CVE-2016-5733", "CVE-2016-5739"], "description": "Package : phpmyadmin\nVersion : 4:3.4.11.1-2+deb7u5\nCVE ID : CVE-2016-5731 CVE-2016-5733 CVE-2016-5739\n\nPhpmyadmin, a web administration tool for MySQL, had several\nCross Site Scripting (XSS) vulnerabilities were reported.\n\nCVE-2016-5731\n\n With a specially crafted request, it is possible to trigger\n an XSS attack through the example OpenID authentication script.\n\nCVE-2016-5733\n\n Several XSS vulnerabilities were found with the Transformation\n feature.\n Also a vulnerability was reported allowing a specifically-\n configured MySQL server to execute an XSS attack.\n This particular attack requires configuring the MySQL server\n log_bin directive with the payload.\n\nCVE-2016-5739\n\n A vulnerability was reported where a specially crafted\n Transformation could be used to leak information including\n the authentication token. This could be used to direct a\n CSRF attack against a user.\n\nFor Debian 7 "Wheezy", these problems have been fixed in version\n4:3.4.11.1-2+deb7u5.\n\nWe recommend that you upgrade your phpmyadmin packages.\n\nFurther information about Debian LTS security advisories, how to apply\nthese updates to your system and frequently asked questions can be\nfound at: https://wiki.debian.org/LTS\n\n- -- \n --------------------- Ola Lundqvist ---------------------------\n/ opal@debian.org Folkebogatan 26 \\\n| ola@inguza.com 654 68 KARLSTAD |\n| http://inguza.com/ +46 (0)70-332 1551 |\n\\ gpg/f.p.: 22F2 32C6 B1E0 F4BF 2B26 0A6A 5E90 DCFA 9426 876F /\n ---------------------------------------------------------------\n", "edition": 2, "modified": "2016-07-17T21:23:51", "published": "2016-07-17T21:23:51", "id": "DEBIAN:DLA-551-1:E3A98", "href": "https://lists.debian.org/debian-lts-announce/2016/debian-lts-announce-201607/msg00013.html", "title": "[SECURITY] [DLA 551-1] phpmyadmin security update", "type": "debian", "cvss": {"score": 5.0, "vector": "AV:N/AC:L/Au:N/C:P/I:N/A:N"}}, {"lastseen": "2019-05-30T02:22:29", "bulletinFamily": "unix", "cvelist": ["CVE-2016-2040", "CVE-2016-5701", "CVE-2016-5731", "CVE-2016-2561", "CVE-2016-5705", "CVE-2016-1927", "CVE-2016-5099", "CVE-2016-2560", "CVE-2016-2039", "CVE-2016-5733", "CVE-2016-2041", "CVE-2016-5739", "CVE-2016-5706"], "description": "- -------------------------------------------------------------------------\nDebian Security Advisory DSA-3627-1 security@debian.org\nhttps://www.debian.org/security/ Thijs Kinkhorst\nJuly 24, 2016 https://www.debian.org/security/faq\n- -------------------------------------------------------------------------\n\nPackage : phpmyadmin\nCVE ID : CVE-2016-1927 CVE-2016-2039 CVE-2016-2040 CVE-2016-2041 \n CVE-2016-2560 CVE-2016-2561 CVE-2016-5099 CVE-2016-5701\n CVE-2016-5705 CVE-2016-5706 CVE-2016-5731 CVE-2016-5733\n CVE-2016-5739\n\nSeveral vulnerabilities have been fixed in phpMyAdmin, the web-based\nMySQL administration interface.\n\nCVE-2016-1927\n\n The suggestPassword function relied on a non-secure random number\n generator which makes it easier for remote attackers to guess\n generated passwords via a brute-force approach.\n\nCVE-2016-2039\n\n CSRF token values were generated by a non-secure random number\n genrator, which allows remote attackers to bypass intended access\n restrictions by predicting a value.\n\nCVE-2016-2040\n\n Multiple cross-site scripting (XSS) vulnerabilities allow remote\n authenticated users to inject arbitrary web script or HTML.\n\nCVE-2016-2041\n\n phpMyAdmin does not use a constant-time algorithm for comparing\n CSRF tokens, which makes it easier for remote attackers to bypass\n intended access restrictions by measuring time differences.\n\nCVE-2016-2560\n\n Multiple cross-site scripting (XSS) vulnerabilities allow remote\n attackers to inject arbitrary web script or HTML.\n\nCVE-2016-2561\n\n Multiple cross-site scripting (XSS) vulnerabilities allow remote\n attackers to inject arbitrary web script or HTML.\n\nCVE-2016-5099\n\n Multiple cross-site scripting (XSS) vulnerabilities allow remote\n attackers to inject arbitrary web script or HTML.\n\nCVE-2016-5701\n\n For installations running on plain HTTP, phpMyAdmin allows remote\n attackers to conduct BBCode injection attacks against HTTP sessions\n via a crafted URI.\n\nCVE-2016-5705\n\n Multiple cross-site scripting (XSS) vulnerabilities allow remote\n attackers to inject arbitrary web script or HTML.\n\nCVE-2016-5706\n\n phpMyAdmin allows remote attackers to cause a denial of service\n (resource consumption) via a large array in the scripts parameter.\n\nCVE-2016-5731\n\n A cross-site scripting (XSS) vulnerability allows remote\n attackers to inject arbitrary web script or HTML.\n\nCVE-2016-5733\n\n Multiple cross-site scripting (XSS) vulnerabilities allow remote\n attackers to inject arbitrary web script or HTML.\n\nCVE-2016-5739\n\n A specially crafted Transformation could leak information which\n a remote attacker could use to perform cross site request forgeries.\n\nFor the stable distribution (jessie), these problems have been fixed in\nversion 4:4.2.12-2+deb8u2.\n\nFor the unstable distribution (sid), these problems have been fixed in\nversion 4:4.6.3-1.\n\nWe recommend that you upgrade your phpmyadmin packages.\n\nFurther information about Debian Security Advisories, how to apply\nthese updates to your system and frequently asked questions can be\nfound at: https://www.debian.org/security/\n\nMailing list: debian-security-announce@lists.debian.org\n", "edition": 2, "modified": "2016-07-24T16:03:48", "published": "2016-07-24T16:03:48", "id": "DEBIAN:DSA-3627-1:EBE43", "href": "https://lists.debian.org/debian-security-announce/debian-security-announce-2016/msg00205.html", "title": "[SECURITY] [DSA 3627-1] phpmyadmin security update", "type": "debian", "cvss": {"score": 5.0, "vector": "AV:N/AC:L/Au:N/C:P/I:N/A:N"}}], "nessus": [{"lastseen": "2021-02-01T05:20:20", "description": "According to its self-reported version number, the phpMyAdmin\napplication hosted on the remote web server is 4.0.x prior to\n4.0.10.16. It is, therefore, affected by the following\nvulnerabilities :\n\n - A flaw exists in the setup/frames/index.inc.php script\n that allows an unauthenticated, remote attacker to access\n the program on a non-HTTPS connection and thereby inject\n arbitrary BBCode against HTTP sessions. (CVE-2016-5701)\n\n - A flaw exists in the js/get_scripts.js.php script when\n handling a large array in the 'scripts' parameter during\n the loading of a crafted JavaScript file. An\n unauthenticated, remote attacker can exploit this to\n cause a denial of service condition. (CVE-2016-5706)\n\n - A information disclosure vulnerability exists in the\n Example OpenID Authentication and Setup scripts that\n allows an remote attacker, via multiple vectors, to\n disclose the application's installation path in an\n error message. (CVE-2016-5730)\n\n - A reflected cross-site scripting (XSS) vulnerability\n exists in the examples/openid.php script when handling\n OpenID error messages due to improper validation of\n input before returning it to users. An unauthenticated,\n remote attacker can exploit this, via a specially\n crafted request, to execute arbitrary script code in a\n user's browser session. (CVE-2016-5731)\n\n - Multiple cross-site scripting (XSS) vulnerabilities\n exist due to improper validation of user-supplied input\n before returning it to users. An unauthenticated, remote\n attacker can exploit these, via specially crafted\n requests, to execute arbitrary script code or HTML in a\n user's browser session. (CVE-2016-5733)\n\n - A flaw exists in the table search and replace feature\n due to improper sanitization of parameters before\n passing them to the preg_replace() function. An\n unauthenticated, remote attacker can exploit this, via\n a specially crafted string, to execute arbitrary PHP\n code. (CVE-2016-5734)\n\n - An information disclosure vulnerability exists in the\n libraries/Header.class.php script when handling\n transformations due to a failure to use the 'no-referer'\n Content Security Policy (CSP) protection mechanism. An\n unauthenticated, remote attacker can exploit this, via a\n specially crafted Transformation, to disclose sensitive\n authentication token information, which then can be\n potentially used to facilitate cross-site request\n forgery (XSRF) attacks. (CVE-2016-5739)\n\nNote that Nessus has not attempted to exploit these issues but has\ninstead relied only on the application's self-reported version number.", "edition": 28, "cvss3": {"score": 9.8, "vector": "AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"}, "published": "2017-04-25T00:00:00", "title": "phpMyAdmin 4.0.x < 4.0.10.16 Multiple Vulnerabilities (PMASA-2016-17, PMASA-2016-22 - PMASA-2016-24, PMASA-2016-26 - PMASA-2016-28)", "type": "nessus", "bulletinFamily": "scanner", "cvelist": ["CVE-2016-5701", "CVE-2016-5730", "CVE-2016-5731", "CVE-2016-5734", "CVE-2016-5733", "CVE-2016-5739", "CVE-2016-5706"], "modified": "2021-02-02T00:00:00", "cpe": ["cpe:/a:phpmyadmin:phpmyadmin"], "id": "PHPMYADMIN_4_0_10_16.NASL", "href": "https://www.tenable.com/plugins/nessus/99661", "sourceData": "#\n# (C) Tenable Network Security, Inc.\n#\n\ninclude(\"compat.inc\");\n\nif (description)\n{\n script_id(99661);\n script_version(\"1.5\");\n script_cvs_date(\"Date: 2019/11/13\");\n\n script_cve_id(\n \"CVE-2016-5701\",\n \"CVE-2016-5706\",\n \"CVE-2016-5730\",\n \"CVE-2016-5731\",\n \"CVE-2016-5733\",\n \"CVE-2016-5734\",\n \"CVE-2016-5739\"\n );\n script_bugtraq_id(\n 91376,\n 91379,\n 91383,\n 91384,\n 91387,\n 91389,\n 91390\n );\n script_xref(name:\"EDB-ID\", value:\"40185\");\n\n script_name(english:\"phpMyAdmin 4.0.x < 4.0.10.16 Multiple Vulnerabilities (PMASA-2016-17, PMASA-2016-22 - PMASA-2016-24, PMASA-2016-26 - PMASA-2016-28)\");\n script_summary(english:\"Checks the version of phpMyAdmin.\");\n\n script_set_attribute(attribute:\"synopsis\", value:\n\"The remote web server hosts a PHP application that is affected by\nmultiple vulnerabilities.\");\n script_set_attribute(attribute:\"description\", value:\n\"According to its self-reported version number, the phpMyAdmin\napplication hosted on the remote web server is 4.0.x prior to\n4.0.10.16. It is, therefore, affected by the following\nvulnerabilities :\n\n - A flaw exists in the setup/frames/index.inc.php script\n that allows an unauthenticated, remote attacker to access\n the program on a non-HTTPS connection and thereby inject\n arbitrary BBCode against HTTP sessions. (CVE-2016-5701)\n\n - A flaw exists in the js/get_scripts.js.php script when\n handling a large array in the 'scripts' parameter during\n the loading of a crafted JavaScript file. An\n unauthenticated, remote attacker can exploit this to\n cause a denial of service condition. (CVE-2016-5706)\n\n - A information disclosure vulnerability exists in the\n Example OpenID Authentication and Setup scripts that\n allows an remote attacker, via multiple vectors, to\n disclose the application's installation path in an\n error message. (CVE-2016-5730)\n\n - A reflected cross-site scripting (XSS) vulnerability\n exists in the examples/openid.php script when handling\n OpenID error messages due to improper validation of\n input before returning it to users. An unauthenticated,\n remote attacker can exploit this, via a specially\n crafted request, to execute arbitrary script code in a\n user's browser session. (CVE-2016-5731)\n\n - Multiple cross-site scripting (XSS) vulnerabilities\n exist due to improper validation of user-supplied input\n before returning it to users. An unauthenticated, remote\n attacker can exploit these, via specially crafted\n requests, to execute arbitrary script code or HTML in a\n user's browser session. (CVE-2016-5733)\n\n - A flaw exists in the table search and replace feature\n due to improper sanitization of parameters before\n passing them to the preg_replace() function. An\n unauthenticated, remote attacker can exploit this, via\n a specially crafted string, to execute arbitrary PHP\n code. (CVE-2016-5734)\n\n - An information disclosure vulnerability exists in the\n libraries/Header.class.php script when handling\n transformations due to a failure to use the 'no-referer'\n Content Security Policy (CSP) protection mechanism. An\n unauthenticated, remote attacker can exploit this, via a\n specially crafted Transformation, to disclose sensitive\n authentication token information, which then can be\n potentially used to facilitate cross-site request\n forgery (XSRF) attacks. (CVE-2016-5739)\n\nNote that Nessus has not attempted to exploit these issues but has\ninstead relied only on the application's self-reported version number.\");\n script_set_attribute(attribute:\"see_also\", value:\"https://www.phpmyadmin.net/security/PMASA-2016-17/\");\n script_set_attribute(attribute:\"see_also\", value:\"https://www.phpmyadmin.net/security/PMASA-2016-22/\");\n script_set_attribute(attribute:\"see_also\", value:\"https://www.phpmyadmin.net/security/PMASA-2016-23/\");\n script_set_attribute(attribute:\"see_also\", value:\"https://www.phpmyadmin.net/security/PMASA-2016-24/\");\n script_set_attribute(attribute:\"see_also\", value:\"https://www.phpmyadmin.net/security/PMASA-2016-26/\");\n script_set_attribute(attribute:\"see_also\", value:\"https://www.phpmyadmin.net/security/PMASA-2016-27/\");\n script_set_attribute(attribute:\"see_also\", value:\"https://www.phpmyadmin.net/security/PMASA-2016-28/\");\n script_set_attribute(attribute:\"solution\", value:\n\"Upgrade to phpMyAdmin version 4.0.10.16 or later. Alternatively,\napply the patches referenced in the vendor advisories.\");\n script_set_cvss_base_vector(\"CVSS2#AV:N/AC:L/Au:N/C:P/I:P/A:P\");\n script_set_cvss_temporal_vector(\"CVSS2#E:F/RL:OF/RC:C\");\n script_set_cvss3_base_vector(\"CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H\");\n script_set_cvss3_temporal_vector(\"CVSS:3.0/E:F/RL:O/RC:C\");\n\n script_set_attribute(attribute:\"exploitability_ease\", value:\"No exploit is required\");\n script_set_attribute(attribute:\"exploit_available\", value:\"true\");\n script_set_attribute(attribute:\"exploit_framework_core\", value:\"true\");\n script_set_attribute(attribute:\"metasploit_name\", value:'phpMyAdmin Authenticated Remote Code Execution');\n script_set_attribute(attribute:\"exploit_framework_metasploit\", value:\"true\");\n\n script_set_attribute(attribute:\"vuln_publication_date\", value:\"2016/06/23\");\n script_set_attribute(attribute:\"patch_publication_date\", value:\"2016/06/23\");\n script_set_attribute(attribute:\"plugin_publication_date\", value:\"2017/04/25\");\n\n script_set_attribute(attribute:\"potential_vulnerability\", value:\"true\");\n script_set_attribute(attribute:\"plugin_type\", value:\"remote\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/a:phpmyadmin:phpmyadmin\");\n script_end_attributes();\n\n script_category(ACT_GATHER_INFO);\n script_family(english:\"CGI abuses\");\n\n script_copyright(english:\"This script is Copyright (C) 2017-2019 and is owned by Tenable, Inc. or an Affiliate thereof.\");\n\n script_dependencies(\"phpMyAdmin_detect.nasl\");\n script_require_keys(\"www/PHP\", \"installed_sw/phpMyAdmin\", \"Settings/ParanoidReport\");\n script_require_ports(\"Services/www\", 80);\n\n exit(0);\n}\n\ninclude(\"vcf.inc\");\ninclude(\"http.inc\");\n\n\napp = \"phpMyAdmin\";\nget_install_count(app_name:app, exit_if_zero:TRUE);\nif (report_paranoia < 2) audit(AUDIT_PARANOID);\nport = get_http_port(default:80, php:TRUE);\n\napp_info = vcf::get_app_info(app:app, port:port, webapp:TRUE);\nvcf::check_granularity(app_info:app_info, sig_segments:3);\n\nconstraints = [\n { \"min_version\" : \"4.0.0\", \"max_version\" : \"4.0.10.15\", \"fixed_version\" : \"4.0.10.16\" }\n];\n\nvcf::check_version_and_report(app_info:app_info, constraints:constraints, severity:SECURITY_HOLE, flags:{xss:true});\n", "cvss": {"score": 7.5, "vector": "AV:N/AC:L/Au:N/C:P/I:P/A:P"}}, {"lastseen": "2021-01-20T12:30:42", "description": "phpMyAdmin was updated to version 4.4.15.7 to fix eight security\nissues.\n\nThese security issues were fixed :\n\n - CVE-2016-5701: BBCode injection vulnerability\n (boo#986154)\n\n - CVE-2016-5703: SQL injection attack (boo#986154)\n\n - CVE-2016-5705: Multiple XSS vulnerabilities (boo#986154)\n\n - CVE-2016-5706: DOS attack (boo#986154)\n\n - CVE-2016-5730: Multiple full path disclosure\n vulnerabilities (boo#986154)\n\n - CVE-2016-5731: XSS through FPD (boo#986154)\n\n - CVE-2016-5733: Multiple XSS vulnerabilities (boo#986154)\n\n - CVE-2016-5739: Referrer leak in transformations\n (boo#986154)\n\nThis non-security issues was fixed :\n\n - Fix issue Setup script doesn't use input type 'password'\n in all relevant locations", "edition": 19, "cvss3": {"score": 9.8, "vector": "AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"}, "published": "2016-06-29T00:00:00", "title": "openSUSE Security Update : phpMyAdmin (openSUSE-2016-804)", "type": "nessus", "bulletinFamily": "scanner", "cvelist": ["CVE-2016-5701", "CVE-2016-5730", "CVE-2016-5731", "CVE-2016-5705", "CVE-2016-5703", "CVE-2016-5733", "CVE-2016-5739", "CVE-2016-5706"], "modified": "2016-06-29T00:00:00", "cpe": ["cpe:/o:novell:opensuse:42.1", "cpe:/o:novell:opensuse:13.2", "p-cpe:/a:novell:opensuse:phpMyAdmin"], "id": "OPENSUSE-2016-804.NASL", "href": "https://www.tenable.com/plugins/nessus/91888", "sourceData": "#%NASL_MIN_LEVEL 70300\n#\n# (C) Tenable Network Security, Inc.\n#\n# The descriptive text and package checks in this plugin were\n# extracted from openSUSE Security Update openSUSE-2016-804.\n#\n# The text description of this plugin is (C) SUSE LLC.\n#\n\ninclude('deprecated_nasl_level.inc');\ninclude('compat.inc');\n\nif (description)\n{\n script_id(91888);\n script_version(\"2.6\");\n script_set_attribute(attribute:\"plugin_modification_date\", value:\"2021/01/19\");\n\n script_cve_id(\"CVE-2016-5701\", \"CVE-2016-5703\", \"CVE-2016-5705\", \"CVE-2016-5706\", \"CVE-2016-5730\", \"CVE-2016-5731\", \"CVE-2016-5733\", \"CVE-2016-5739\");\n\n script_name(english:\"openSUSE Security Update : phpMyAdmin (openSUSE-2016-804)\");\n script_summary(english:\"Check for the openSUSE-2016-804 patch\");\n\n script_set_attribute(\n attribute:\"synopsis\", \n value:\"The remote openSUSE host is missing a security update.\"\n );\n script_set_attribute(\n attribute:\"description\", \n value:\n\"phpMyAdmin was updated to version 4.4.15.7 to fix eight security\nissues.\n\nThese security issues were fixed :\n\n - CVE-2016-5701: BBCode injection vulnerability\n (boo#986154)\n\n - CVE-2016-5703: SQL injection attack (boo#986154)\n\n - CVE-2016-5705: Multiple XSS vulnerabilities (boo#986154)\n\n - CVE-2016-5706: DOS attack (boo#986154)\n\n - CVE-2016-5730: Multiple full path disclosure\n vulnerabilities (boo#986154)\n\n - CVE-2016-5731: XSS through FPD (boo#986154)\n\n - CVE-2016-5733: Multiple XSS vulnerabilities (boo#986154)\n\n - CVE-2016-5739: Referrer leak in transformations\n (boo#986154)\n\nThis non-security issues was fixed :\n\n - Fix issue Setup script doesn't use input type 'password'\n in all relevant locations\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.opensuse.org/show_bug.cgi?id=986154\"\n );\n script_set_attribute(\n attribute:\"solution\", \n value:\"Update the affected phpMyAdmin package.\"\n );\n script_set_cvss_base_vector(\"CVSS2#AV:N/AC:L/Au:N/C:P/I:P/A:P\");\n script_set_cvss3_base_vector(\"CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H\");\n\n script_set_attribute(attribute:\"plugin_type\", value:\"local\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:phpMyAdmin\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/o:novell:opensuse:13.2\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/o:novell:opensuse:42.1\");\n\n script_set_attribute(attribute:\"patch_publication_date\", value:\"2016/06/28\");\n script_set_attribute(attribute:\"plugin_publication_date\", value:\"2016/06/29\");\n script_end_attributes();\n\n script_category(ACT_GATHER_INFO);\n script_copyright(english:\"This script is Copyright (C) 2016-2021 Tenable Network Security, Inc.\");\n script_family(english:\"SuSE Local Security Checks\");\n\n script_dependencies(\"ssh_get_info.nasl\");\n script_require_keys(\"Host/local_checks_enabled\", \"Host/SuSE/release\", \"Host/SuSE/rpm-list\");\n\n exit(0);\n}\n\n\ninclude(\"audit.inc\");\ninclude(\"global_settings.inc\");\ninclude(\"rpm.inc\");\n\nif (!get_kb_item(\"Host/local_checks_enabled\")) audit(AUDIT_LOCAL_CHECKS_NOT_ENABLED);\nrelease = get_kb_item(\"Host/SuSE/release\");\nif (isnull(release) || release =~ \"^(SLED|SLES)\") audit(AUDIT_OS_NOT, \"openSUSE\");\nif (release !~ \"^(SUSE13\\.2|SUSE42\\.1)$\") audit(AUDIT_OS_RELEASE_NOT, \"openSUSE\", \"13.2 / 42.1\", release);\nif (!get_kb_item(\"Host/SuSE/rpm-list\")) audit(AUDIT_PACKAGE_LIST_MISSING);\n\n\n\nflag = 0;\n\nif ( rpm_check(release:\"SUSE13.2\", reference:\"phpMyAdmin-4.4.15.7-36.1\") ) flag++;\nif ( rpm_check(release:\"SUSE42.1\", reference:\"phpMyAdmin-4.4.15.7-22.1\") ) flag++;\n\nif (flag)\n{\n if (report_verbosity > 0) security_hole(port:0, extra:rpm_report_get());\n else security_hole(0);\n exit(0);\n}\nelse\n{\n tested = pkg_tests_get();\n if (tested) audit(AUDIT_PACKAGE_NOT_AFFECTED, tested);\n else audit(AUDIT_PACKAGE_NOT_INSTALLED, \"phpMyAdmin\");\n}\n", "cvss": {"score": 7.5, "vector": "AV:N/AC:L/Au:N/C:P/I:P/A:P"}}, {"lastseen": "2021-01-20T12:30:42", "description": "This phpMyAdmin update to version 4.4.15.7 fixes the following \nissues :\n\nIssues fixed: Setup script doesn't use input type 'password' in all\nrelevant locations\n\nSecurity issues fixed :\n\n - PMASA-2016-17 (CVE-2016-5701, CWE-661)\n https://www.phpmyadmin.net/security/PMASA-2016-17/\n\n - BBCode injection vulnerability\n\n - PMASA-2016-19 (CVE-2016-5703, CWE-661)\n https://www.phpmyadmin.net/security/PMASA-2016-19/\n\n - SQL injection attack\n\n - PMASA-2016-21 (CVE-2016-5705, CWE-661)\n https://www.phpmyadmin.net/security/PMASA-2016-21/\n\n - Multiple XSS vulnerabilities\n\n - PMASA-2016-22 (CVE-2016-5706, CWE-661)\n https://www.phpmyadmin.net/security/PMASA-2016-22/\n\n - DOS attack\n\n - PMASA-2016-23 (CVE-2016-5730, CWE-661)\n https://www.phpmyadmin.net/security/PMASA-2016-23/\n\n - Multiple full path disclosure vulnerabilities\n\n - PMASA-2016-24 (CVE-2016-5731, CWE-661)\n https://www.phpmyadmin.net/security/PMASA-2016-24/\n\n - XSS through FPD\n\n - PMASA-2016-26 (CVE-2016-5733, CWE-661)\n https://www.phpmyadmin.net/security/PMASA-2016-26/\n\n - Multiple XSS vulnerabilities\n\n - PMASA-2016-28 (CVE-2016-5739, CWE-661)\n https://www.phpmyadmin.net/security/PMASA-2016-28/\n\n - Referrer leak in transformations", "edition": 19, "cvss3": {"score": 9.8, "vector": "AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"}, "published": "2016-06-29T00:00:00", "title": "openSUSE Security Update : phpMyAdmin (openSUSE-2016-806)", "type": "nessus", "bulletinFamily": "scanner", "cvelist": ["CVE-2016-5701", "CVE-2016-5730", "CVE-2016-5731", "CVE-2016-5705", "CVE-2016-5703", "CVE-2016-5733", "CVE-2016-5739", "CVE-2016-5706"], "modified": "2016-06-29T00:00:00", "cpe": ["cpe:/o:novell:opensuse:13.1", "p-cpe:/a:novell:opensuse:phpMyAdmin"], "id": "OPENSUSE-2016-806.NASL", "href": "https://www.tenable.com/plugins/nessus/91889", "sourceData": "#%NASL_MIN_LEVEL 70300\n#\n# (C) Tenable Network Security, Inc.\n#\n# The descriptive text and package checks in this plugin were\n# extracted from openSUSE Security Update openSUSE-2016-806.\n#\n# The text description of this plugin is (C) SUSE LLC.\n#\n\ninclude('deprecated_nasl_level.inc');\ninclude('compat.inc');\n\nif (description)\n{\n script_id(91889);\n script_version(\"2.6\");\n script_set_attribute(attribute:\"plugin_modification_date\", value:\"2021/01/19\");\n\n script_cve_id(\"CVE-2016-5701\", \"CVE-2016-5703\", \"CVE-2016-5705\", \"CVE-2016-5706\", \"CVE-2016-5730\", \"CVE-2016-5731\", \"CVE-2016-5733\", \"CVE-2016-5739\");\n\n script_name(english:\"openSUSE Security Update : phpMyAdmin (openSUSE-2016-806)\");\n script_summary(english:\"Check for the openSUSE-2016-806 patch\");\n\n script_set_attribute(\n attribute:\"synopsis\", \n value:\"The remote openSUSE host is missing a security update.\"\n );\n script_set_attribute(\n attribute:\"description\", \n value:\n\"This phpMyAdmin update to version 4.4.15.7 fixes the following \nissues :\n\nIssues fixed: Setup script doesn't use input type 'password' in all\nrelevant locations\n\nSecurity issues fixed :\n\n - PMASA-2016-17 (CVE-2016-5701, CWE-661)\n https://www.phpmyadmin.net/security/PMASA-2016-17/\n\n - BBCode injection vulnerability\n\n - PMASA-2016-19 (CVE-2016-5703, CWE-661)\n https://www.phpmyadmin.net/security/PMASA-2016-19/\n\n - SQL injection attack\n\n - PMASA-2016-21 (CVE-2016-5705, CWE-661)\n https://www.phpmyadmin.net/security/PMASA-2016-21/\n\n - Multiple XSS vulnerabilities\n\n - PMASA-2016-22 (CVE-2016-5706, CWE-661)\n https://www.phpmyadmin.net/security/PMASA-2016-22/\n\n - DOS attack\n\n - PMASA-2016-23 (CVE-2016-5730, CWE-661)\n https://www.phpmyadmin.net/security/PMASA-2016-23/\n\n - Multiple full path disclosure vulnerabilities\n\n - PMASA-2016-24 (CVE-2016-5731, CWE-661)\n https://www.phpmyadmin.net/security/PMASA-2016-24/\n\n - XSS through FPD\n\n - PMASA-2016-26 (CVE-2016-5733, CWE-661)\n https://www.phpmyadmin.net/security/PMASA-2016-26/\n\n - Multiple XSS vulnerabilities\n\n - PMASA-2016-28 (CVE-2016-5739, CWE-661)\n https://www.phpmyadmin.net/security/PMASA-2016-28/\n\n - Referrer leak in transformations\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.opensuse.org/show_bug.cgi?id=986154\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://www.phpmyadmin.net/security/PMASA-2016-17/\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://www.phpmyadmin.net/security/PMASA-2016-19/\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://www.phpmyadmin.net/security/PMASA-2016-21/\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://www.phpmyadmin.net/security/PMASA-2016-22/\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://www.phpmyadmin.net/security/PMASA-2016-23/\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://www.phpmyadmin.net/security/PMASA-2016-24/\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://www.phpmyadmin.net/security/PMASA-2016-26/\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://www.phpmyadmin.net/security/PMASA-2016-28/\"\n );\n script_set_attribute(\n attribute:\"solution\", \n value:\"Update the affected phpMyAdmin package.\"\n );\n script_set_cvss_base_vector(\"CVSS2#AV:N/AC:L/Au:N/C:P/I:P/A:P\");\n script_set_cvss3_base_vector(\"CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H\");\n\n script_set_attribute(attribute:\"plugin_type\", value:\"local\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:phpMyAdmin\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/o:novell:opensuse:13.1\");\n\n script_set_attribute(attribute:\"patch_publication_date\", value:\"2016/06/28\");\n script_set_attribute(attribute:\"plugin_publication_date\", value:\"2016/06/29\");\n script_end_attributes();\n\n script_category(ACT_GATHER_INFO);\n script_copyright(english:\"This script is Copyright (C) 2016-2021 Tenable Network Security, Inc.\");\n script_family(english:\"SuSE Local Security Checks\");\n\n script_dependencies(\"ssh_get_info.nasl\");\n script_require_keys(\"Host/local_checks_enabled\", \"Host/SuSE/release\", \"Host/SuSE/rpm-list\");\n\n exit(0);\n}\n\n\ninclude(\"audit.inc\");\ninclude(\"global_settings.inc\");\ninclude(\"rpm.inc\");\n\nif (!get_kb_item(\"Host/local_checks_enabled\")) audit(AUDIT_LOCAL_CHECKS_NOT_ENABLED);\nrelease = get_kb_item(\"Host/SuSE/release\");\nif (isnull(release) || release =~ \"^(SLED|SLES)\") audit(AUDIT_OS_NOT, \"openSUSE\");\nif (release !~ \"^(SUSE13\\.1)$\") audit(AUDIT_OS_RELEASE_NOT, \"openSUSE\", \"13.1\", release);\nif (!get_kb_item(\"Host/SuSE/rpm-list\")) audit(AUDIT_PACKAGE_LIST_MISSING);\n\n\n\nflag = 0;\n\nif ( rpm_check(release:\"SUSE13.1\", reference:\"phpMyAdmin-4.4.15.7-60.1\") ) flag++;\n\nif (flag)\n{\n if (report_verbosity > 0) security_hole(port:0, extra:rpm_report_get());\n else security_hole(0);\n exit(0);\n}\nelse\n{\n tested = pkg_tests_get();\n if (tested) audit(AUDIT_PACKAGE_NOT_AFFECTED, tested);\n else audit(AUDIT_PACKAGE_NOT_INSTALLED, \"phpMyAdmin\");\n}\n", "cvss": {"score": 7.5, "vector": "AV:N/AC:L/Au:N/C:P/I:P/A:P"}}, {"lastseen": "2021-02-01T05:20:20", "description": "According to its self-reported version number, the phpMyAdmin\napplication hosted on the remote web server is 4.4.x prior to \n4.4.15.7. It is, therefore, affected by the following vulnerabilities:\n\n - A flaw exists in the setup/frames/index.inc.php script\n that allows an unauthenticated, remote attacker to access\n the program on a non-HTTPS connection and thereby inject\n arbitrary BBCode against HTTP sessions. (CVE-2016-5701)\n\n - A flaw exists in the libraries/central_columns.lib.php\n script when handling database names due to improper\n sanitization of user-supplied input. An unauthenticated,\n remote attacker can exploit this, via a crafted database\n name, to inject or manipulate SQL queries in the\n back-end database, resulting in modification or\n disclosure of arbitrary data. (CVE-2016-5703)\n\n - Multiple cross-site scripting (XSS) vulnerabilities\n exist due to improper validation of user-supplied input\n before returning it to users. An unauthenticated, remote\n attacker can exploit these, via specially crafted\n requests, to execute arbitrary script code or HTML in a\n a user's browser session. (CVE-2016-5705)\n\n - A flaw exists in the js/get_scripts.js.php script when\n handling a large array in the 'scripts' parameter during\n the loading of a crafted JavaScript file. An\n unauthenticated, remote attacker can exploit this to\n cause a denial of service condition. (CVE-2016-5706)\n\n - A information disclosure vulnerability exists in the\n Example OpenID Authentication and Setup scripts that\n allows an remote attacker, via multiple vectors, to\n disclose the application's installation path in an\n error message. (CVE-2016-5730)\n\n - A reflected cross-site scripting (XSS) vulnerability\n exists in the examples/openid.php script when handling\n OpenID error messages due to improper validation of\n input before returning it to users. An unauthenticated,\n remote attacker can exploit this, via a specially\n crafted request, to execute arbitrary script code in a\n user's browser session. (CVE-2016-5731)\n\n - Multiple cross-site scripting (XSS) vulnerabilities\n exist due to improper validation of user-supplied input\n before returning it to users. An unauthenticated, remote\n attacker can exploit these, via specially crafted\n requests, to execute arbitrary script code or HTML in a\n user's browser session. (CVE-2016-5733)\n\n - A flaw exists in the table search and replace feature\n due to improper sanitization of parameters before\n passing them to the preg_replace() function. An\n unauthenticated, remote attacker can exploit this, via\n a specially crafted string, to execute arbitrary PHP\n code. (CVE-2016-5734)\n\n - An information disclosure vulnerability exists in the\n libraries/Header.class.php script when handling\n transformations due to a failure to use the 'no-referer'\n Content Security Policy (CSP) protection mechanism. An\n unauthenticated, remote attacker can exploit this, via a\n specially crafted Transformation, to disclose sensitive\n authentication token information, which then can be\n potentially used to facilitate cross-site request\n forgery (XSRF) attacks. (CVE-2016-5739)\n\nNote that Nessus has not attempted to exploit these issues but has\ninstead relied only on the application's self-reported version number.", "edition": 28, "cvss3": {"score": 9.8, "vector": "AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"}, "published": "2017-04-25T00:00:00", "title": "phpMyAdmin 4.4.x < 4.4.15.7 Multiple Vulnerabilities (PMASA-2016-17, PMASA-2016-19, PMASA-2016-21 - PMASA-2016-24, PMASA-2016-26 - PMASA-2016-28)", "type": "nessus", "bulletinFamily": "scanner", "cvelist": ["CVE-2016-5701", "CVE-2016-5730", "CVE-2016-5731", "CVE-2016-5734", "CVE-2016-5705", "CVE-2016-5703", "CVE-2016-5733", "CVE-2016-5739", "CVE-2016-5706"], "modified": "2021-02-02T00:00:00", "cpe": ["cpe:/a:phpmyadmin:phpmyadmin"], "id": "PHPMYADMIN_4_4_15_7.NASL", "href": "https://www.tenable.com/plugins/nessus/99662", "sourceData": "#\n# (C) Tenable Network Security, Inc.\n#\n\ninclude(\"compat.inc\");\n\nif (description)\n{\n script_id(99662);\n script_version(\"1.5\");\n script_cvs_date(\"Date: 2019/11/13\");\n\n script_cve_id(\n \"CVE-2016-5701\",\n \"CVE-2016-5703\",\n \"CVE-2016-5705\",\n \"CVE-2016-5706\",\n \"CVE-2016-5730\",\n \"CVE-2016-5731\",\n \"CVE-2016-5733\",\n \"CVE-2016-5734\",\n \"CVE-2016-5739\"\n );\n script_bugtraq_id(\n 91376,\n 91378,\n 91379,\n 91381,\n 91383,\n 91384,\n 91387,\n 91389,\n 91390\n );\n\n script_name(english:\"phpMyAdmin 4.4.x < 4.4.15.7 Multiple Vulnerabilities (PMASA-2016-17, PMASA-2016-19, PMASA-2016-21 - PMASA-2016-24, PMASA-2016-26 - PMASA-2016-28)\");\n script_summary(english:\"Checks the version of phpMyAdmin.\");\n\n script_set_attribute(attribute:\"synopsis\", value:\n\"The remote web server hosts a PHP application that is affected by\nmultiple vulnerabilities.\");\n script_set_attribute(attribute:\"description\", value:\n\"According to its self-reported version number, the phpMyAdmin\napplication hosted on the remote web server is 4.4.x prior to \n4.4.15.7. It is, therefore, affected by the following vulnerabilities:\n\n - A flaw exists in the setup/frames/index.inc.php script\n that allows an unauthenticated, remote attacker to access\n the program on a non-HTTPS connection and thereby inject\n arbitrary BBCode against HTTP sessions. (CVE-2016-5701)\n\n - A flaw exists in the libraries/central_columns.lib.php\n script when handling database names due to improper\n sanitization of user-supplied input. An unauthenticated,\n remote attacker can exploit this, via a crafted database\n name, to inject or manipulate SQL queries in the\n back-end database, resulting in modification or\n disclosure of arbitrary data. (CVE-2016-5703)\n\n - Multiple cross-site scripting (XSS) vulnerabilities\n exist due to improper validation of user-supplied input\n before returning it to users. An unauthenticated, remote\n attacker can exploit these, via specially crafted\n requests, to execute arbitrary script code or HTML in a\n a user's browser session. (CVE-2016-5705)\n\n - A flaw exists in the js/get_scripts.js.php script when\n handling a large array in the 'scripts' parameter during\n the loading of a crafted JavaScript file. An\n unauthenticated, remote attacker can exploit this to\n cause a denial of service condition. (CVE-2016-5706)\n\n - A information disclosure vulnerability exists in the\n Example OpenID Authentication and Setup scripts that\n allows an remote attacker, via multiple vectors, to\n disclose the application's installation path in an\n error message. (CVE-2016-5730)\n\n - A reflected cross-site scripting (XSS) vulnerability\n exists in the examples/openid.php script when handling\n OpenID error messages due to improper validation of\n input before returning it to users. An unauthenticated,\n remote attacker can exploit this, via a specially\n crafted request, to execute arbitrary script code in a\n user's browser session. (CVE-2016-5731)\n\n - Multiple cross-site scripting (XSS) vulnerabilities\n exist due to improper validation of user-supplied input\n before returning it to users. An unauthenticated, remote\n attacker can exploit these, via specially crafted\n requests, to execute arbitrary script code or HTML in a\n user's browser session. (CVE-2016-5733)\n\n - A flaw exists in the table search and replace feature\n due to improper sanitization of parameters before\n passing them to the preg_replace() function. An\n unauthenticated, remote attacker can exploit this, via\n a specially crafted string, to execute arbitrary PHP\n code. (CVE-2016-5734)\n\n - An information disclosure vulnerability exists in the\n libraries/Header.class.php script when handling\n transformations due to a failure to use the 'no-referer'\n Content Security Policy (CSP) protection mechanism. An\n unauthenticated, remote attacker can exploit this, via a\n specially crafted Transformation, to disclose sensitive\n authentication token information, which then can be\n potentially used to facilitate cross-site request\n forgery (XSRF) attacks. (CVE-2016-5739)\n\nNote that Nessus has not attempted to exploit these issues but has\ninstead relied only on the application's self-reported version number.\");\n script_set_attribute(attribute:\"see_also\", value:\"https://www.phpmyadmin.net/security/PMASA-2016-17/\");\n script_set_attribute(attribute:\"see_also\", value:\"https://www.phpmyadmin.net/security/PMASA-2016-19/\");\n script_set_attribute(attribute:\"see_also\", value:\"https://www.phpmyadmin.net/security/PMASA-2016-21/\");\n script_set_attribute(attribute:\"see_also\", value:\"https://www.phpmyadmin.net/security/PMASA-2016-22/\");\n script_set_attribute(attribute:\"see_also\", value:\"https://www.phpmyadmin.net/security/PMASA-2016-23/\");\n script_set_attribute(attribute:\"see_also\", value:\"https://www.phpmyadmin.net/security/PMASA-2016-24/\");\n script_set_attribute(attribute:\"see_also\", value:\"https://www.phpmyadmin.net/security/PMASA-2016-26/\");\n script_set_attribute(attribute:\"see_also\", value:\"https://www.phpmyadmin.net/security/PMASA-2016-27/\");\n script_set_attribute(attribute:\"see_also\", value:\"https://www.phpmyadmin.net/security/PMASA-2016-28/\");\n script_set_attribute(attribute:\"solution\", value:\n\"Upgrade to phpMyAdmin version 4.4.15.7 or later. Alternatively,\napply the patches referenced in the vendor advisories.\");\n script_set_cvss_base_vector(\"CVSS2#AV:N/AC:L/Au:N/C:P/I:P/A:P\");\n script_set_cvss_temporal_vector(\"CVSS2#E:F/RL:OF/RC:C\");\n script_set_cvss3_base_vector(\"CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H\");\n script_set_cvss3_temporal_vector(\"CVSS:3.0/E:F/RL:O/RC:C\");\n\n script_set_attribute(attribute:\"exploitability_ease\", value:\"No exploit is required\");\n script_set_attribute(attribute:\"exploit_available\", value:\"true\");\n script_set_attribute(attribute:\"exploit_framework_core\", value:\"true\");\n script_set_attribute(attribute:\"metasploit_name\", value:'phpMyAdmin Authenticated Remote Code Execution');\n script_set_attribute(attribute:\"exploit_framework_metasploit\", value:\"true\");\n\n script_set_attribute(attribute:\"vuln_publication_date\", value:\"2016/06/23\");\n script_set_attribute(attribute:\"patch_publication_date\", value:\"2016/06/23\");\n script_set_attribute(attribute:\"plugin_publication_date\", value:\"2017/04/25\");\n\n script_set_attribute(attribute:\"potential_vulnerability\", value:\"true\");\n script_set_attribute(attribute:\"plugin_type\", value:\"remote\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/a:phpmyadmin:phpmyadmin\");\n script_end_attributes();\n\n script_category(ACT_GATHER_INFO);\n script_family(english:\"CGI abuses\");\n\n script_copyright(english:\"This script is Copyright (C) 2017-2019 and is owned by Tenable, Inc. or an Affiliate thereof.\");\n\n script_dependencies(\"phpMyAdmin_detect.nasl\");\n script_require_keys(\"www/PHP\", \"installed_sw/phpMyAdmin\", \"Settings/ParanoidReport\");\n script_require_ports(\"Services/www\", 80);\n\n exit(0);\n}\n\ninclude(\"vcf.inc\");\ninclude(\"http.inc\");\n\n\napp = \"phpMyAdmin\";\nget_install_count(app_name:app, exit_if_zero:TRUE);\nif (report_paranoia < 2) audit(AUDIT_PARANOID);\nport = get_http_port(default:80, php:TRUE);\n\napp_info = vcf::get_app_info(app:app, port:port, webapp:TRUE);\nvcf::check_granularity(app_info:app_info, sig_segments:3);\n\nconstraints = [\n { \"min_version\" : \"4.4.0\", \"max_version\" : \"4.4.15.6\", \"fixed_version\" : \"4.4.15.7\" }\n];\n\nvcf::check_version_and_report(app_info:app_info, constraints:constraints, severity:SECURITY_HOLE, flags:{xss:true,sqli:true});\n", "cvss": {"score": 7.5, "vector": "AV:N/AC:L/Au:N/C:P/I:P/A:P"}}, {"lastseen": "2021-01-06T10:59:28", "description": "Please reference CVE/URL list for details", "edition": 27, "cvss3": {"score": 9.8, "vector": "AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"}, "published": "2016-07-05T00:00:00", "title": "FreeBSD : phpMyAdmin -- multiple vulnerabilities (e7028e1d-3f9b-11e6-81f9-6805ca0b3d42)", "type": "nessus", "bulletinFamily": "scanner", "cvelist": ["CVE-2016-5704", "CVE-2016-5702", "CVE-2016-5701", "CVE-2016-5730", "CVE-2016-5731", "CVE-2016-5734", "CVE-2016-5705", "CVE-2016-5732", "CVE-2016-5703", "CVE-2016-5733", "CVE-2016-5739", "CVE-2016-5706"], "modified": "2016-07-05T00:00:00", "cpe": ["cpe:/o:freebsd:freebsd", "p-cpe:/a:freebsd:freebsd:phpmyadmin"], "id": "FREEBSD_PKG_E7028E1D3F9B11E681F96805CA0B3D42.NASL", "href": "https://www.tenable.com/plugins/nessus/91939", "sourceData": "#%NASL_MIN_LEVEL 70300\n#\n# (C) Tenable Network Security, Inc.\n#\n# The descriptive text and package checks in this plugin were \n# extracted from the FreeBSD VuXML database :\n#\n# Copyright 2003-2018 Jacques Vidrine and contributors\n#\n# Redistribution and use in source (VuXML) and 'compiled' forms (SGML,\n# HTML, PDF, PostScript, RTF and so forth) with or without modification,\n# are permitted provided that the following conditions are met:\n# 1. Redistributions of source code (VuXML) must retain the above\n# copyright notice, this list of conditions and the following\n# disclaimer as the first lines of this file unmodified.\n# 2. Redistributions in compiled form (transformed to other DTDs,\n# published online in any format, converted to PDF, PostScript,\n# RTF and other formats) must reproduce the above copyright\n# notice, this list of conditions and the following disclaimer\n# in the documentation and/or other materials provided with the\n# distribution.\n# \n# THIS DOCUMENTATION IS PROVIDED BY THE AUTHOR AND CONTRIBUTORS \"AS IS\"\n# AND ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO,\n# THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR\n# PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE AUTHOR OR CONTRIBUTORS\n# BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY,\n# OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT\n# OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR\n# BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY,\n# WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE\n# OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF THIS DOCUMENTATION,\n# EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.\n#\n\ninclude('deprecated_nasl_level.inc');\ninclude('compat.inc');\n\nif (description)\n{\n script_id(91939);\n script_version(\"2.11\");\n script_set_attribute(attribute:\"plugin_modification_date\", value:\"2021/01/04\");\n\n script_cve_id(\"CVE-2016-5701\", \"CVE-2016-5702\", \"CVE-2016-5703\", \"CVE-2016-5704\", \"CVE-2016-5705\", \"CVE-2016-5706\", \"CVE-2016-5730\", \"CVE-2016-5731\", \"CVE-2016-5732\", \"CVE-2016-5733\", \"CVE-2016-5734\", \"CVE-2016-5739\");\n\n script_name(english:\"FreeBSD : phpMyAdmin -- multiple vulnerabilities (e7028e1d-3f9b-11e6-81f9-6805ca0b3d42)\");\n script_summary(english:\"Checks for updated package in pkg_info output\");\n\n script_set_attribute(\n attribute:\"synopsis\", \n value:\"The remote FreeBSD host is missing a security-related update.\"\n );\n script_set_attribute(\n attribute:\"description\", \n value:\"Please reference CVE/URL list for details\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://www.phpmyadmin.net/security/PMASA-2016-17/\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://www.phpmyadmin.net/security/PMASA-2016-18/\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://www.phpmyadmin.net/security/PMASA-2016-19/\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://www.phpmyadmin.net/security/PMASA-2016-20/\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://www.phpmyadmin.net/security/PMASA-2016-21/\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://www.phpmyadmin.net/security/PMASA-2016-22/\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://www.phpmyadmin.net/security/PMASA-2016-23/\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://www.phpmyadmin.net/security/PMASA-2016-24/\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://www.phpmyadmin.net/security/PMASA-2016-25/\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://www.phpmyadmin.net/security/PMASA-2016-26/\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://www.phpmyadmin.net/security/PMASA-2016-27/\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://www.phpmyadmin.net/security/PMASA-2016-28/\"\n );\n # https://vuxml.freebsd.org/freebsd/e7028e1d-3f9b-11e6-81f9-6805ca0b3d42.html\n script_set_attribute(\n attribute:\"see_also\",\n value:\"http://www.nessus.org/u?55f00e1a\"\n );\n script_set_attribute(attribute:\"solution\", value:\"Update the affected package.\");\n script_set_cvss_base_vector(\"CVSS2#AV:N/AC:L/Au:N/C:P/I:P/A:P\");\n script_set_cvss_temporal_vector(\"CVSS2#E:F/RL:OF/RC:C\");\n script_set_cvss3_base_vector(\"CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H\");\n script_set_cvss3_temporal_vector(\"CVSS:3.0/E:F/RL:O/RC:C\");\n script_set_attribute(attribute:\"exploitability_ease\", value:\"Exploits are available\");\n script_set_attribute(attribute:\"exploit_available\", value:\"true\");\n script_set_attribute(attribute:\"exploit_framework_core\", value:\"true\");\n script_set_attribute(attribute:\"metasploit_name\", value:'phpMyAdmin Authenticated Remote Code Execution');\n script_set_attribute(attribute:\"exploit_framework_metasploit\", value:\"true\");\n\n script_set_attribute(attribute:\"plugin_type\", value:\"local\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:freebsd:freebsd:phpmyadmin\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/o:freebsd:freebsd\");\n\n script_set_attribute(attribute:\"vuln_publication_date\", value:\"2016/06/23\");\n script_set_attribute(attribute:\"patch_publication_date\", value:\"2016/07/01\");\n script_set_attribute(attribute:\"plugin_publication_date\", value:\"2016/07/05\");\n script_end_attributes();\n\n script_category(ACT_GATHER_INFO);\n script_copyright(english:\"This script is Copyright (C) 2016-2021 and is owned by Tenable, Inc. or an Affiliate thereof.\");\n script_family(english:\"FreeBSD Local Security Checks\");\n\n script_dependencies(\"ssh_get_info.nasl\");\n script_require_keys(\"Host/local_checks_enabled\", \"Host/FreeBSD/release\", \"Host/FreeBSD/pkg_info\");\n\n exit(0);\n}\n\n\ninclude(\"audit.inc\");\ninclude(\"freebsd_package.inc\");\n\n\nif (!get_kb_item(\"Host/local_checks_enabled\")) audit(AUDIT_LOCAL_CHECKS_NOT_ENABLED);\nif (!get_kb_item(\"Host/FreeBSD/release\")) audit(AUDIT_OS_NOT, \"FreeBSD\");\nif (!get_kb_item(\"Host/FreeBSD/pkg_info\")) audit(AUDIT_PACKAGE_LIST_MISSING);\n\n\nflag = 0;\n\nif (pkg_test(save_report:TRUE, pkg:\"phpmyadmin>=4.6.0<4.6.3\")) flag++;\n\nif (flag)\n{\n if (report_verbosity > 0) security_hole(port:0, extra:pkg_report_get());\n else security_hole(0);\n exit(0);\n}\nelse audit(AUDIT_HOST_NOT, \"affected\");\n", "cvss": {"score": 7.5, "vector": "AV:N/AC:L/Au:N/C:P/I:P/A:P"}}, {"lastseen": "2021-02-01T05:20:20", "description": "According to its self-reported version number, the phpMyAdmin\napplication hosted on the remote web server is 4.6.x prior to \n4.6.3. It is, therefore, affected by the following vulnerabilities:\n\n - A flaw exists in the setup/frames/index.inc.php script\n that allows an unauthenticated, remote attacker to access\n the program on a non-HTTPS connection and thereby inject\n arbitrary BBCode against HTTP sessions. (CVE-2016-5701)\n\n - An unspecified flaw exists, whenever the environment\n lacks a PHP_SELF value, that allows an unauthenticated,\n remote attacker to inject arbitrary attributes into\n browser cookies by using a specially crafted URI.\n (CVE-2016-5702)\n\n - A flaw exists in the libraries/central_columns.lib.php\n script when handling database names due to improper\n sanitization of user-supplied input. An unauthenticated,\n remote attacker can exploit this, via a crafted database\n name, to inject or manipulate SQL queries in the\n back-end database, resulting in modification or\n disclosure of arbitrary data. (CVE-2016-5703)\n\n - A cross-site scripting (XSS) vulnerability exists in the\n templates/table/structure/display_table_stats.phtml\n script when handling table comments due to improper\n validation of input before returning it to users. An\n unauthenticated, remote attacker can exploit this, via a\n specially crafted request, to execute arbitrary script\n code in a user's browser session. (CVE-2016-5704)\n\n - Multiple cross-site scripting (XSS) vulnerabilities\n exist due to improper validation of user-supplied input\n before returning it to users. An unauthenticated, remote\n attacker can exploit these, via specially crafted\n requests, to execute arbitrary script code or HTML in a\n a user's browser session. (CVE-2016-5705)\n\n - A flaw exists in the js/get_scripts.js.php script when\n handling a large array in the 'scripts' parameter during\n the loading of a crafted JavaScript file. An\n unauthenticated, remote attacker can exploit this to\n cause a denial of service condition. (CVE-2016-5706)\n\n - A information disclosure vulnerability exists in the\n Example OpenID Authentication and Setup scripts that\n allows an remote attacker, via multiple vectors, to\n disclose the application's installation path in an\n error message. (CVE-2016-5730)\n\n - A reflected cross-site scripting (XSS) vulnerability\n exists in the examples/openid.php script when handling\n OpenID error messages due to improper validation of\n input before returning it to users. An unauthenticated,\n remote attacker can exploit this, via a specially\n crafted request, to execute arbitrary script code in a\n user's browser session. (CVE-2016-5731)\n\n - A cross-site scripting (XSS) vulnerability exists in the\n templates/table/structure/display_partitions.phtml\n script when handling table parameters due to improper\n validation of input before returning it to users. An\n unauthenticated, remote attacker can exploit this, via a\n specially crafted request, to execute arbitrary script\n code in a user's browser session. (CVE-2016-5732)\n\n - Multiple cross-site scripting (XSS) vulnerabilities\n exist due to improper validation of user-supplied input\n before returning it to users. An unauthenticated, remote\n attacker can exploit these, via specially crafted\n requests, to execute arbitrary script code or HTML in a\n user's browser session. (CVE-2016-5733)\n\n - A flaw exists in the table search and replace feature\n due to improper sanitization of parameters before\n passing them to the preg_replace() function. An\n unauthenticated, remote attacker can exploit this, via\n a specially crafted string, to execute arbitrary PHP\n code. (CVE-2016-5734)\n\n - An information disclosure vulnerability exists in the\n libraries/Header.class.php script when handling\n transformations due to a failure to use the 'no-referer'\n Content Security Policy (CSP) protection mechanism. An\n unauthenticated, remote attacker can exploit this, via a\n specially crafted Transformation, to disclose sensitive\n authentication token information, which then can be\n potentially used to facilitate cross-site request\n forgery (XSRF) attacks. (CVE-2016-5739)\n\nNote that Nessus has not attempted to exploit these issues but has\ninstead relied only on the application's self-reported version number.", "edition": 28, "cvss3": {"score": 9.8, "vector": "AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"}, "published": "2017-04-25T00:00:00", "title": "phpMyAdmin 4.6.x < 4.6.3 Multiple Vulnerabilities (PMASA-2016-17 - PMASA-2016-28)", "type": "nessus", "bulletinFamily": "scanner", "cvelist": ["CVE-2016-5704", "CVE-2016-5702", "CVE-2016-5701", "CVE-2016-5730", "CVE-2016-5731", "CVE-2016-5734", "CVE-2016-5705", "CVE-2016-5732", "CVE-2016-5703", "CVE-2016-5733", "CVE-2016-5739", "CVE-2016-5706"], "modified": "2021-02-02T00:00:00", "cpe": ["cpe:/a:phpmyadmin:phpmyadmin"], "id": "PHPMYADMIN_4_6_3.NASL", "href": "https://www.tenable.com/plugins/nessus/99663", "sourceData": "#\n# (C) Tenable Network Security, Inc.\n#\n\ninclude(\"compat.inc\");\n\nif (description)\n{\n script_id(99663);\n script_version(\"1.5\");\n script_cvs_date(\"Date: 2019/11/13\");\n\n script_cve_id(\n \"CVE-2016-5701\",\n \"CVE-2016-5702\",\n \"CVE-2016-5703\",\n \"CVE-2016-5704\",\n \"CVE-2016-5705\",\n \"CVE-2016-5706\",\n \"CVE-2016-5730\",\n \"CVE-2016-5731\",\n \"CVE-2016-5732\",\n \"CVE-2016-5733\",\n \"CVE-2016-5734\",\n \"CVE-2016-5739\"\n );\n script_bugtraq_id(\n 91376,\n 91378,\n 91379,\n 91380,\n 91381,\n 91383,\n 91384,\n 91386,\n 91387,\n 91389,\n 91390,\n 91392\n );\n\n script_name(english:\"phpMyAdmin 4.6.x < 4.6.3 Multiple Vulnerabilities (PMASA-2016-17 - PMASA-2016-28)\");\n script_summary(english:\"Checks the version of phpMyAdmin.\");\n\n script_set_attribute(attribute:\"synopsis\", value:\n\"The remote web server hosts a PHP application that is affected by\nmultiple vulnerabilities.\");\n script_set_attribute(attribute:\"description\", value:\n\"According to its self-reported version number, the phpMyAdmin\napplication hosted on the remote web server is 4.6.x prior to \n4.6.3. It is, therefore, affected by the following vulnerabilities:\n\n - A flaw exists in the setup/frames/index.inc.php script\n that allows an unauthenticated, remote attacker to access\n the program on a non-HTTPS connection and thereby inject\n arbitrary BBCode against HTTP sessions. (CVE-2016-5701)\n\n - An unspecified flaw exists, whenever the environment\n lacks a PHP_SELF value, that allows an unauthenticated,\n remote attacker to inject arbitrary attributes into\n browser cookies by using a specially crafted URI.\n (CVE-2016-5702)\n\n - A flaw exists in the libraries/central_columns.lib.php\n script when handling database names due to improper\n sanitization of user-supplied input. An unauthenticated,\n remote attacker can exploit this, via a crafted database\n name, to inject or manipulate SQL queries in the\n back-end database, resulting in modification or\n disclosure of arbitrary data. (CVE-2016-5703)\n\n - A cross-site scripting (XSS) vulnerability exists in the\n templates/table/structure/display_table_stats.phtml\n script when handling table comments due to improper\n validation of input before returning it to users. An\n unauthenticated, remote attacker can exploit this, via a\n specially crafted request, to execute arbitrary script\n code in a user's browser session. (CVE-2016-5704)\n\n - Multiple cross-site scripting (XSS) vulnerabilities\n exist due to improper validation of user-supplied input\n before returning it to users. An unauthenticated, remote\n attacker can exploit these, via specially crafted\n requests, to execute arbitrary script code or HTML in a\n a user's browser session. (CVE-2016-5705)\n\n - A flaw exists in the js/get_scripts.js.php script when\n handling a large array in the 'scripts' parameter during\n the loading of a crafted JavaScript file. An\n unauthenticated, remote attacker can exploit this to\n cause a denial of service condition. (CVE-2016-5706)\n\n - A information disclosure vulnerability exists in the\n Example OpenID Authentication and Setup scripts that\n allows an remote attacker, via multiple vectors, to\n disclose the application's installation path in an\n error message. (CVE-2016-5730)\n\n - A reflected cross-site scripting (XSS) vulnerability\n exists in the examples/openid.php script when handling\n OpenID error messages due to improper validation of\n input before returning it to users. An unauthenticated,\n remote attacker can exploit this, via a specially\n crafted request, to execute arbitrary script code in a\n user's browser session. (CVE-2016-5731)\n\n - A cross-site scripting (XSS) vulnerability exists in the\n templates/table/structure/display_partitions.phtml\n script when handling table parameters due to improper\n validation of input before returning it to users. An\n unauthenticated, remote attacker can exploit this, via a\n specially crafted request, to execute arbitrary script\n code in a user's browser session. (CVE-2016-5732)\n\n - Multiple cross-site scripting (XSS) vulnerabilities\n exist due to improper validation of user-supplied input\n before returning it to users. An unauthenticated, remote\n attacker can exploit these, via specially crafted\n requests, to execute arbitrary script code or HTML in a\n user's browser session. (CVE-2016-5733)\n\n - A flaw exists in the table search and replace feature\n due to improper sanitization of parameters before\n passing them to the preg_replace() function. An\n unauthenticated, remote attacker can exploit this, via\n a specially crafted string, to execute arbitrary PHP\n code. (CVE-2016-5734)\n\n - An information disclosure vulnerability exists in the\n libraries/Header.class.php script when handling\n transformations due to a failure to use the 'no-referer'\n Content Security Policy (CSP) protection mechanism. An\n unauthenticated, remote attacker can exploit this, via a\n specially crafted Transformation, to disclose sensitive\n authentication token information, which then can be\n potentially used to facilitate cross-site request\n forgery (XSRF) attacks. (CVE-2016-5739)\n\nNote that Nessus has not attempted to exploit these issues but has\ninstead relied only on the application's self-reported version number.\");\n script_set_attribute(attribute:\"see_also\", value:\"https://www.phpmyadmin.net/security/PMASA-2016-17/\");\n script_set_attribute(attribute:\"see_also\", value:\"https://www.phpmyadmin.net/security/PMASA-2016-18/\");\n script_set_attribute(attribute:\"see_also\", value:\"https://www.phpmyadmin.net/security/PMASA-2016-19/\");\n script_set_attribute(attribute:\"see_also\", value:\"https://www.phpmyadmin.net/security/PMASA-2016-20/\");\n script_set_attribute(attribute:\"see_also\", value:\"https://www.phpmyadmin.net/security/PMASA-2016-21/\");\n script_set_attribute(attribute:\"see_also\", value:\"https://www.phpmyadmin.net/security/PMASA-2016-22/\");\n script_set_attribute(attribute:\"see_also\", value:\"https://www.phpmyadmin.net/security/PMASA-2016-23/\");\n script_set_attribute(attribute:\"see_also\", value:\"https://www.phpmyadmin.net/security/PMASA-2016-24/\");\n script_set_attribute(attribute:\"see_also\", value:\"https://www.phpmyadmin.net/security/PMASA-2016-25/\");\n script_set_attribute(attribute:\"see_also\", value:\"https://www.phpmyadmin.net/security/PMASA-2016-26/\");\n script_set_attribute(attribute:\"see_also\", value:\"https://www.phpmyadmin.net/security/PMASA-2016-27/\");\n script_set_attribute(attribute:\"see_also\", value:\"https://www.phpmyadmin.net/security/PMASA-2016-28/\");\n script_set_attribute(attribute:\"solution\", value:\n\"Upgrade to phpMyAdmin version 4.6.3 or later. Alternatively,\napply the patches referenced in the vendor advisories.\");\n script_set_cvss_base_vector(\"CVSS2#AV:N/AC:L/Au:N/C:P/I:P/A:P\");\n script_set_cvss_temporal_vector(\"CVSS2#E:F/RL:OF/RC:C\");\n script_set_cvss3_base_vector(\"CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H\");\n script_set_cvss3_temporal_vector(\"CVSS:3.0/E:F/RL:O/RC:C\");\n\n script_set_attribute(attribute:\"exploitability_ease\", value:\"No exploit is required\");\n script_set_attribute(attribute:\"exploit_available\", value:\"true\");\n script_set_attribute(attribute:\"exploit_framework_core\", value:\"true\");\n script_set_attribute(attribute:\"metasploit_name\", value:'phpMyAdmin Authenticated Remote Code Execution');\n script_set_attribute(attribute:\"exploit_framework_metasploit\", value:\"true\");\n\n script_set_attribute(attribute:\"vuln_publication_date\", value:\"2016/06/23\");\n script_set_attribute(attribute:\"patch_publication_date\", value:\"2016/06/23\");\n script_set_attribute(attribute:\"plugin_publication_date\", value:\"2017/04/25\");\n\n script_set_attribute(attribute:\"potential_vulnerability\", value:\"true\");\n script_set_attribute(attribute:\"plugin_type\", value:\"remote\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/a:phpmyadmin:phpmyadmin\");\n script_end_attributes();\n\n script_category(ACT_GATHER_INFO);\n script_family(english:\"CGI abuses\");\n\n script_copyright(english:\"This script is Copyright (C) 2017-2019 and is owned by Tenable, Inc. or an Affiliate thereof.\");\n\n script_dependencies(\"phpMyAdmin_detect.nasl\");\n script_require_keys(\"www/PHP\", \"installed_sw/phpMyAdmin\", \"Settings/ParanoidReport\");\n script_require_ports(\"Services/www\", 80);\n\n exit(0);\n}\n\ninclude(\"vcf.inc\");\ninclude(\"http.inc\");\n\n\napp = \"phpMyAdmin\";\nget_install_count(app_name:app, exit_if_zero:TRUE);\nif (report_paranoia < 2) audit(AUDIT_PARANOID);\nport = get_http_port(default:80, php:TRUE);\n\napp_info = vcf::get_app_info(app:app, port:port, webapp:TRUE);\nvcf::check_granularity(app_info:app_info, sig_segments:3);\n\nconstraints = [\n { \"min_version\" : \"4.6.0\", \"max_version\" : \"4.6.2\", \"fixed_version\" : \"4.6.3\" }\n];\n\nvcf::check_version_and_report(app_info:app_info, constraints:constraints, severity:SECURITY_HOLE, flags:{xss:true,sqli:true});\n", "cvss": {"score": 7.5, "vector": "AV:N/AC:L/Au:N/C:P/I:P/A:P"}}, {"lastseen": "2021-01-12T09:49:43", "description": "Several vulnerabilities have been fixed in phpMyAdmin, the web-based\nMySQL administration interface.\n\n - CVE-2016-1927\n The suggestPassword function relied on a non-secure\n random number generator which makes it easier for remote\n attackers to guess generated passwords via a brute-force\n approach.\n\n - CVE-2016-2039\n CSRF token values were generated by a non-secure random\n number generator, which allows remote attackers to\n bypass intended access restrictions by predicting a\n value.\n\n - CVE-2016-2040\n Multiple cross-site scripting (XSS) vulnerabilities\n allow remote authenticated users to inject arbitrary web\n script or HTML.\n\n - CVE-2016-2041\n phpMyAdmin does not use a constant-time algorithm for\n comparing CSRF tokens, which makes it easier for remote\n attackers to bypass intended access restrictions by\n measuring time differences.\n\n - CVE-2016-2560\n Multiple cross-site scripting (XSS) vulnerabilities\n allow remote attackers to inject arbitrary web script or\n HTML.\n\n - CVE-2016-2561\n Multiple cross-site scripting (XSS) vulnerabilities\n allow remote attackers to inject arbitrary web script or\n HTML.\n\n - CVE-2016-5099\n Multiple cross-site scripting (XSS) vulnerabilities\n allow remote attackers to inject arbitrary web script or\n HTML.\n\n - CVE-2016-5701\n For installations running on plain HTTP, phpMyAdmin\n allows remote attackers to conduct BBCode injection\n attacks against HTTP sessions via a crafted URI.\n\n - CVE-2016-5705\n Multiple cross-site scripting (XSS) vulnerabilities\n allow remote attackers to inject arbitrary web script or\n HTML.\n\n - CVE-2016-5706\n phpMyAdmin allows remote attackers to cause a denial of\n service (resource consumption) via a large array in the\n scripts parameter.\n\n - CVE-2016-5731\n A cross-site scripting (XSS) vulnerability allows remote\n attackers to inject arbitrary web script or HTML.\n\n - CVE-2016-5733\n Multiple cross-site scripting (XSS) vulnerabilities\n allow remote attackers to inject arbitrary web script or\n HTML.\n\n - CVE-2016-5739\n A specially crafted Transformation could leak\n information which a remote attacker could use to perform\n cross site request forgeries.", "edition": 24, "cvss3": {"score": 7.5, "vector": "AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N"}, "published": "2016-07-25T00:00:00", "title": "Debian DSA-3627-1 : phpmyadmin - security update", "type": "nessus", "bulletinFamily": "scanner", "cvelist": ["CVE-2016-2040", "CVE-2016-5701", "CVE-2016-5731", "CVE-2016-2561", "CVE-2016-5705", "CVE-2016-1927", "CVE-2016-5099", "CVE-2016-2560", "CVE-2016-2039", "CVE-2016-5733", "CVE-2016-2041", "CVE-2016-5739", "CVE-2016-5706"], "modified": "2016-07-25T00:00:00", "cpe": ["cpe:/o:debian:debian_linux:8.0", "p-cpe:/a:debian:debian_linux:phpmyadmin"], "id": "DEBIAN_DSA-3627.NASL", "href": "https://www.tenable.com/plugins/nessus/92527", "sourceData": "#%NASL_MIN_LEVEL 70300\n#\n# (C) Tenable Network Security, Inc.\n#\n# The descriptive text and package checks in this plugin were \n# extracted from Debian Security Advisory DSA-3627. The text \n# itself is copyright (C) Software in the Public Interest, Inc.\n#\n\ninclude('deprecated_nasl_level.inc');\ninclude('compat.inc');\n\nif (description)\n{\n script_id(92527);\n script_version(\"2.9\");\n script_set_attribute(attribute:\"plugin_modification_date\", value:\"2021/01/11\");\n\n script_cve_id(\"CVE-2016-1927\", \"CVE-2016-2039\", \"CVE-2016-2040\", \"CVE-2016-2041\", \"CVE-2016-2560\", \"CVE-2016-2561\", \"CVE-2016-5099\", \"CVE-2016-5701\", \"CVE-2016-5705\", \"CVE-2016-5706\", \"CVE-2016-5731\", \"CVE-2016-5733\", \"CVE-2016-5739\");\n script_xref(name:\"DSA\", value:\"3627\");\n\n script_name(english:\"Debian DSA-3627-1 : phpmyadmin - security update\");\n script_summary(english:\"Checks dpkg output for the updated package\");\n\n script_set_attribute(\n attribute:\"synopsis\", \n value:\"The remote Debian host is missing a security-related update.\"\n );\n script_set_attribute(\n attribute:\"description\", \n value:\n\"Several vulnerabilities have been fixed in phpMyAdmin, the web-based\nMySQL administration interface.\n\n - CVE-2016-1927\n The suggestPassword function relied on a non-secure\n random number generator which makes it easier for remote\n attackers to guess generated passwords via a brute-force\n approach.\n\n - CVE-2016-2039\n CSRF token values were generated by a non-secure random\n number generator, which allows remote attackers to\n bypass intended access restrictions by predicting a\n value.\n\n - CVE-2016-2040\n Multiple cross-site scripting (XSS) vulnerabilities\n allow remote authenticated users to inject arbitrary web\n script or HTML.\n\n - CVE-2016-2041\n phpMyAdmin does not use a constant-time algorithm for\n comparing CSRF tokens, which makes it easier for remote\n attackers to bypass intended access restrictions by\n measuring time differences.\n\n - CVE-2016-2560\n Multiple cross-site scripting (XSS) vulnerabilities\n allow remote attackers to inject arbitrary web script or\n HTML.\n\n - CVE-2016-2561\n Multiple cross-site scripting (XSS) vulnerabilities\n allow remote attackers to inject arbitrary web script or\n HTML.\n\n - CVE-2016-5099\n Multiple cross-site scripting (XSS) vulnerabilities\n allow remote attackers to inject arbitrary web script or\n HTML.\n\n - CVE-2016-5701\n For installations running on plain HTTP, phpMyAdmin\n allows remote attackers to conduct BBCode injection\n attacks against HTTP sessions via a crafted URI.\n\n - CVE-2016-5705\n Multiple cross-site scripting (XSS) vulnerabilities\n allow remote attackers to inject arbitrary web script or\n HTML.\n\n - CVE-2016-5706\n phpMyAdmin allows remote attackers to cause a denial of\n service (resource consumption) via a large array in the\n scripts parameter.\n\n - CVE-2016-5731\n A cross-site scripting (XSS) vulnerability allows remote\n attackers to inject arbitrary web script or HTML.\n\n - CVE-2016-5733\n Multiple cross-site scripting (XSS) vulnerabilities\n allow remote attackers to inject arbitrary web script or\n HTML.\n\n - CVE-2016-5739\n A specially crafted Transformation could leak\n information which a remote attacker could use to perform\n cross site request forgeries.\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://security-tracker.debian.org/tracker/CVE-2016-1927\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://security-tracker.debian.org/tracker/CVE-2016-2039\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://security-tracker.debian.org/tracker/CVE-2016-2040\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://security-tracker.debian.org/tracker/CVE-2016-2041\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://security-tracker.debian.org/tracker/CVE-2016-2560\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://security-tracker.debian.org/tracker/CVE-2016-2561\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://security-tracker.debian.org/tracker/CVE-2016-5099\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://security-tracker.debian.org/tracker/CVE-2016-5701\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://security-tracker.debian.org/tracker/CVE-2016-5705\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://security-tracker.debian.org/tracker/CVE-2016-5706\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://security-tracker.debian.org/tracker/CVE-2016-5731\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://security-tracker.debian.org/tracker/CVE-2016-5733\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://security-tracker.debian.org/tracker/CVE-2016-5739\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://packages.debian.org/source/jessie/phpmyadmin\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://www.debian.org/security/2016/dsa-3627\"\n );\n script_set_attribute(\n attribute:\"solution\", \n value:\n\"Upgrade the phpmyadmin packages.\n\nFor the stable distribution (jessie), these problems have been fixed\nin version 4:4.2.12-2+deb8u2.\"\n );\n script_set_cvss_base_vector(\"CVSS2#AV:N/AC:L/Au:N/C:P/I:N/A:N\");\n script_set_cvss_temporal_vector(\"CVSS2#E:U/RL:OF/RC:C\");\n script_set_cvss3_base_vector(\"CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N\");\n script_set_cvss3_temporal_vector(\"CVSS:3.0/E:U/RL:O/RC:C\");\n script_set_attribute(attribute:\"exploitability_ease\", value:\"No known exploits are available\");\n script_set_attribute(attribute:\"exploit_available\", value:\"false\");\n\n script_set_attribute(attribute:\"plugin_type\", value:\"local\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:debian:debian_linux:phpmyadmin\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/o:debian:debian_linux:8.0\");\n\n script_set_attribute(attribute:\"vuln_publication_date\", value:\"2016/02/20\");\n script_set_attribute(attribute:\"patch_publication_date\", value:\"2016/07/24\");\n script_set_attribute(attribute:\"plugin_publication_date\", value:\"2016/07/25\");\n script_set_attribute(attribute:\"generated_plugin\", value:\"current\");\n script_end_attributes();\n\n script_category(ACT_GATHER_INFO);\n script_copyright(english:\"This script is Copyright (C) 2016-2021 and is owned by Tenable, Inc. or an Affiliate thereof.\");\n script_family(english:\"Debian Local Security Checks\");\n\n script_dependencies(\"ssh_get_info.nasl\");\n script_require_keys(\"Host/local_checks_enabled\", \"Host/Debian/release\", \"Host/Debian/dpkg-l\");\n\n exit(0);\n}\n\n\ninclude(\"audit.inc\");\ninclude(\"debian_package.inc\");\n\n\nif (!get_kb_item(\"Host/local_checks_enabled\")) audit(AUDIT_LOCAL_CHECKS_NOT_ENABLED);\nif (!get_kb_item(\"Host/Debian/release\")) audit(AUDIT_OS_NOT, \"Debian\");\nif (!get_kb_item(\"Host/Debian/dpkg-l\")) audit(AUDIT_PACKAGE_LIST_MISSING);\n\n\nflag = 0;\nif (deb_check(release:\"8.0\", prefix:\"phpmyadmin\", reference:\"4:4.2.12-2+deb8u2\")) flag++;\n\nif (flag)\n{\n if (report_verbosity > 0) security_warning(port:0, extra:deb_report_get());\n else security_warning(0);\n exit(0);\n}\nelse audit(AUDIT_HOST_NOT, \"affected\");\n", "cvss": {"score": 5.0, "vector": "AV:N/AC:L/Au:N/C:P/I:N/A:N"}}, {"lastseen": "2021-01-12T11:05:37", "description": "The remote host is affected by the vulnerability described in GLSA-201701-32\n(phpMyAdmin: Multiple vulnerabilities)\n\n Multiple vulnerabilities have been discovered in phpMyAdmin. Please\n review the CVE identifiers referenced below for details.\n \nImpact :\n\n A authenticated remote attacker could exploit these vulnerabilities to\n execute arbitrary PHP Code, inject SQL code, or to conduct Cross-Site\n Scripting attacks.\n In certain configurations, an unauthenticated remote attacker could\n cause a Denial of Service condition.\n \nWorkaround :\n\n There is no known workaround at this time.", "edition": 24, "cvss3": {"score": 9.8, "vector": "AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"}, "published": "2017-01-12T00:00:00", "title": "GLSA-201701-32 : phpMyAdmin: Multiple vulnerabilities", "type": "nessus", "bulletinFamily": "scanner", "cvelist": ["CVE-2016-5098", "CVE-2016-9854", "CVE-2016-6625", "CVE-2016-6615", "CVE-2016-9853", "CVE-2016-5704", "CVE-2016-6614", "CVE-2016-6612", "CVE-2016-9851", "CVE-2016-6617", "CVE-2016-5702", "CVE-2016-6633", "CVE-2016-9848", "CVE-2016-6611", "CVE-2016-6630", "CVE-2016-9863", "CVE-2016-6632", "CVE-2016-5701", "CVE-2016-4412", "CVE-2016-6616", "CVE-2016-9860", "CVE-2016-5730", "CVE-2016-6609", "CVE-2016-9865", "CVE-2016-9852", "CVE-2016-9856", "CVE-2016-9847", "CVE-2016-9858", "CVE-2016-6608", "CVE-2016-5731", "CVE-2016-6622", "CVE-2016-9850", "CVE-2016-6607", "CVE-2016-5097", "CVE-2016-6613", "CVE-2016-5734", "CVE-2016-6606", "CVE-2016-9864", "CVE-2016-5705", "CVE-2016-9859", "CVE-2016-5099", "CVE-2016-5732", "CVE-2016-6626", "CVE-2016-9857", "CVE-2016-5703", "CVE-2016-9855", "CVE-2016-9861", "CVE-2016-6610", "CVE-2016-6619", "CVE-2016-6629", "CVE-2016-6627", "CVE-2016-9849", "CVE-2016-5733", "CVE-2016-6620", "CVE-2016-6623", "CVE-2016-9862", "CVE-2016-5739", "CVE-2016-5706", "CVE-2016-6628", "CVE-2016-6624", "CVE-2016-6631", "CVE-2016-6618", "CVE-2016-9866"], "modified": "2017-01-12T00:00:00", "cpe": ["cpe:/o:gentoo:linux", "p-cpe:/a:gentoo:linux:phpmyadmin"], "id": "GENTOO_GLSA-201701-32.NASL", "href": "https://www.tenable.com/plugins/nessus/96426", "sourceData": "#%NASL_MIN_LEVEL 70300\n#\n# (C) Tenable Network Security, Inc.\n#\n# The descriptive text and package checks in this plugin were\n# extracted from Gentoo Linux Security Advisory GLSA 201701-32.\n#\n# The advisory text is Copyright (C) 2001-2018 Gentoo Foundation, Inc.\n# and licensed under the Creative Commons - Attribution / Share Alike \n# license. See http://creativecommons.org/licenses/by-sa/3.0/\n#\n\ninclude('deprecated_nasl_level.inc');\ninclude('compat.inc');\n\nif (description)\n{\n script_id(96426);\n script_version(\"3.4\");\n script_set_attribute(attribute:\"plugin_modification_date\", value:\"2021/01/11\");\n\n script_cve_id(\"CVE-2016-4412\", \"CVE-2016-5097\", \"CVE-2016-5098\", \"CVE-2016-5099\", \"CVE-2016-5701\", \"CVE-2016-5702\", \"CVE-2016-5703\", \"CVE-2016-5704\", \"CVE-2016-5705\", \"CVE-2016-5706\", \"CVE-2016-5730\", \"CVE-2016-5731\", \"CVE-2016-5732\", \"CVE-2016-5733\", \"CVE-2016-5734\", \"CVE-2016-5739\", \"CVE-2016-6606\", \"CVE-2016-6607\", \"CVE-2016-6608\", \"CVE-2016-6609\", \"CVE-2016-6610\", \"CVE-2016-6611\", \"CVE-2016-6612\", \"CVE-2016-6613\", \"CVE-2016-6614\", \"CVE-2016-6615\", \"CVE-2016-6616\", \"CVE-2016-6617\", \"CVE-2016-6618\", \"CVE-2016-6619\", \"CVE-2016-6620\", \"CVE-2016-6622\", \"CVE-2016-6623\", \"CVE-2016-6624\", \"CVE-2016-6625\", \"CVE-2016-6626\", \"CVE-2016-6627\", \"CVE-2016-6628\", \"CVE-2016-6629\", \"CVE-2016-6630\", \"CVE-2016-6631\", \"CVE-2016-6632\", \"CVE-2016-6633\", \"CVE-2016-9847\", \"CVE-2016-9848\", \"CVE-2016-9849\", \"CVE-2016-9850\", \"CVE-2016-9851\", \"CVE-2016-9852\", \"CVE-2016-9853\", \"CVE-2016-9854\", \"CVE-2016-9855\", \"CVE-2016-9856\", \"CVE-2016-9857\", \"CVE-2016-9858\", \"CVE-2016-9859\", \"CVE-2016-9860\", \"CVE-2016-9861\", \"CVE-2016-9862\", \"CVE-2016-9863\", \"CVE-2016-9864\", \"CVE-2016-9865\", \"CVE-2016-9866\");\n script_xref(name:\"GLSA\", value:\"201701-32\");\n\n script_name(english:\"GLSA-201701-32 : phpMyAdmin: Multiple vulnerabilities\");\n script_summary(english:\"Checks for updated package(s) in /var/db/pkg\");\n\n script_set_attribute(\n attribute:\"synopsis\", \n value:\n\"The remote Gentoo host is missing one or more security-related\npatches.\"\n );\n script_set_attribute(\n attribute:\"description\", \n value:\n\"The remote host is affected by the vulnerability described in GLSA-201701-32\n(phpMyAdmin: Multiple vulnerabilities)\n\n Multiple vulnerabilities have been discovered in phpMyAdmin. Please\n review the CVE identifiers referenced below for details.\n \nImpact :\n\n A authenticated remote attacker could exploit these vulnerabilities to\n execute arbitrary PHP Code, inject SQL code, or to conduct Cross-Site\n Scripting attacks.\n In certain configurations, an unauthenticated remote attacker could\n cause a Denial of Service condition.\n \nWorkaround :\n\n There is no known workaround at this time.\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://security.gentoo.org/glsa/201701-32\"\n );\n script_set_attribute(\n attribute:\"solution\", \n value:\n\"All phpMyAdmin users should upgrade to the latest version:\n # emerge --sync\n # emerge --ask --oneshot --verbose '>=dev-db/phpmyadmin-4.6.5.1'\"\n );\n script_set_cvss_base_vector(\"CVSS2#AV:N/AC:L/Au:N/C:C/I:C/A:C\");\n script_set_cvss_temporal_vector(\"CVSS2#E:F/RL:OF/RC:C\");\n script_set_cvss3_base_vector(\"CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H\");\n script_set_cvss3_temporal_vector(\"CVSS:3.0/E:F/RL:O/RC:C\");\n script_set_attribute(attribute:\"exploitability_ease\", value:\"Exploits are available\");\n script_set_attribute(attribute:\"exploit_available\", value:\"true\");\n script_set_attribute(attribute:\"exploit_framework_core\", value:\"true\");\n script_set_attribute(attribute:\"metasploit_name\", value:'phpMyAdmin Authenticated Remote Code Execution');\n script_set_attribute(attribute:\"exploit_framework_metasploit\", value:\"true\");\n\n script_set_attribute(attribute:\"plugin_type\", value:\"local\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:gentoo:linux:phpmyadmin\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/o:gentoo:linux\");\n\n script_set_attribute(attribute:\"patch_publication_date\", value:\"2017/01/11\");\n script_set_attribute(attribute:\"plugin_publication_date\", value:\"2017/01/12\");\n script_end_attributes();\n\n script_category(ACT_GATHER_INFO);\n script_copyright(english:\"This script is Copyright (C) 2017-2021 and is owned by Tenable, Inc. or an Affiliate thereof.\");\n script_family(english:\"Gentoo Local Security Checks\");\n\n script_dependencies(\"ssh_get_info.nasl\");\n script_require_keys(\"Host/local_checks_enabled\", \"Host/Gentoo/release\", \"Host/Gentoo/qpkg-list\");\n\n exit(0);\n}\n\n\ninclude(\"audit.inc\");\ninclude(\"global_settings.inc\");\ninclude(\"qpkg.inc\");\n\nif (!get_kb_item(\"Host/local_checks_enabled\")) audit(AUDIT_LOCAL_CHECKS_NOT_ENABLED);\nif (!get_kb_item(\"Host/Gentoo/release\")) audit(AUDIT_OS_NOT, \"Gentoo\");\nif (!get_kb_item(\"Host/Gentoo/qpkg-list\")) audit(AUDIT_PACKAGE_LIST_MISSING);\n\n\nflag = 0;\n\nif (qpkg_check(package:\"dev-db/phpmyadmin\", unaffected:make_list(\"ge 4.6.5.1\"), vulnerable:make_list(\"lt 4.6.5.1\"))) flag++;\n\nif (flag)\n{\n if (report_verbosity > 0) security_hole(port:0, extra:qpkg_report_get());\n else security_hole(0);\n exit(0);\n}\nelse\n{\n tested = qpkg_tests_get();\n if (tested) audit(AUDIT_PACKAGE_NOT_AFFECTED, tested);\n else audit(AUDIT_PACKAGE_NOT_INSTALLED, \"phpMyAdmin\");\n}\n", "cvss": {"score": 10.0, "vector": "AV:N/AC:L/Au:N/C:C/I:C/A:C"}}], "phpmyadmin": [{"lastseen": "2019-05-29T19:31:08", "bulletinFamily": "software", "cvelist": ["CVE-2016-5739"], "description": "## PMASA-2016-28\n\n**Announcement-ID:** PMASA-2016-28\n\n**Date:** 2016-06-23\n\n### Summary\n\nReferrer leak in transformations\n\n### Description\n\nA vulnerability was reported where a specially crafted Transformation could be used to leak information including the authentication token. This could be used to direct a CSRF attack against a user.\n\nFurthermore, the CSP code used in version 4.0.x is outdated and has been updated to more modern standards.\n\n### Severity\n\nWe consider this to be of moderate severity\n\n### Affected Versions\n\nAll 4.6.x versions (prior to 4.6.3), 4.4.x versions (prior to 4.4.15.7), and 4.0.x versions (prior to 4.0.10.16) are affected\n\n### Solution\n\nUpgrade to phpMyAdmin 4.6.3, 4.4.15.7, or 4.0.10.16 or newer or apply patch listed below.\n\n### References\n\nThanks to Emanuel Bronshtein [@e3amn2l](<https://twitter.com/e3amn2l>) for reporting this vulnerability.\n\nAssigned CVE ids: [CVE-2016-5739](<https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5739>)\n\nCWE ids: [CWE-661](<https://cwe.mitre.org/data/definitions/661.html>)\n\n### Patches\n\nThe following commits have been made on the 4.0 branch to fix this issue:\n\n * [3287519](<https://github.com/phpmyadmin/phpmyadmin/commit/3287519>)\n * [8c336ba](<https://github.com/phpmyadmin/phpmyadmin/commit/8c336ba>)\n\nThe following commits have been made on the 4.4 branch to fix this issue:\n\n * [22ad8b6](<https://github.com/phpmyadmin/phpmyadmin/commit/22ad8b6>)\n * [adfec38](<https://github.com/phpmyadmin/phpmyadmin/commit/adfec38>)\n\nThe following commits have been made on the 4.6 branch to fix this issue:\n\n * [1e5716c](<https://github.com/phpmyadmin/phpmyadmin/commit/1e5716c>)\n * [2f49508](<https://github.com/phpmyadmin/phpmyadmin/commit/2f49508>)\n\n### More information\n\nFor further information and in case of questions, please contact the phpMyAdmin team. Our website is [ phpmyadmin.net](<https://www.phpmyadmin.net/>). \n", "edition": 2, "modified": "2016-06-23T00:00:00", "published": "2016-06-23T00:00:00", "id": "PHPMYADMIN:PMASA-2016-28", "href": "https://www.phpmyadmin.net/security/PMASA-2016-28/", "title": "Referrer leak in transformations", "type": "phpmyadmin", "cvss": {"score": 5.0, "vector": "AV:N/AC:L/Au:N/C:P/I:N/A:N"}}, {"lastseen": "2019-05-29T19:31:03", "bulletinFamily": "software", "cvelist": ["CVE-2016-5731"], "description": "## PMASA-2016-24\n\n**Announcement-ID:** PMASA-2016-24\n\n**Date:** 2016-06-23\n\n### Summary\n\nXSS through FPD\n\n### Description\n\nWith a specially crafted request, it is possible to trigger an XSS attack through the example OpenID authentication script.\n\n### Severity\n\nWe do not consider this vulnerability to be secure due to the non-standard required PHP setting for html_errors.\n\n### Mitigation factor\n\nThe attack requires html_errors = Off in php.ini, so it can be mitigated by setting html_errors = On. As an alternative mitigation means, the ./examples/openid.php file can be removed.\n\n### Affected Versions\n\nAll 4.6.x versions (prior to 4.6.3), 4.4.x versions (prior to 4.4.15.7), and 4.0.x versions (prior to 4.0.10.16) are affected\n\n### Solution\n\nUpgrade to phpMyAdmin 4.6.3, 4.4.15.7, or 4.0.10.16 or newer or apply patch listed below.\n\n### References\n\nThanks to Emanuel Bronshtein [@e3amn2l](<https://twitter.com/e3amn2l>) for reporting this vulnerability.\n\nAssigned CVE ids: [CVE-2016-5731](<https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5731>)\n\nCWE ids: [CWE-661](<https://cwe.mitre.org/data/definitions/661.html>)\n\n### Patches\n\nThe following commits have been made on the 4.0 branch to fix this issue:\n\n * [5fefa51](<https://github.com/phpmyadmin/phpmyadmin/commit/5fefa51>)\n * [78f6c54](<https://github.com/phpmyadmin/phpmyadmin/commit/78f6c54>)\n\nThe following commits have been made on the 4.4 branch to fix this issue:\n\n * [52e7898](<https://github.com/phpmyadmin/phpmyadmin/commit/52e7898>)\n * [d005ba6](<https://github.com/phpmyadmin/phpmyadmin/commit/d005ba6>)\n\nThe following commits have been made on the 4.6 branch to fix this issue:\n\n * [94cf386](<https://github.com/phpmyadmin/phpmyadmin/commit/94cf386>)\n * [418aeea](<https://github.com/phpmyadmin/phpmyadmin/commit/418aeea>)\n\n### More information\n\nFor further information and in case of questions, please contact the phpMyAdmin team. Our website is [ phpmyadmin.net](<https://www.phpmyadmin.net/>). \n", "edition": 2, "modified": "2016-06-23T00:00:00", "published": "2016-06-23T00:00:00", "id": "PHPMYADMIN:PMASA-2016-24", "href": "https://www.phpmyadmin.net/security/PMASA-2016-24/", "title": "XSS through FPD", "type": "phpmyadmin", "cvss": {"score": 4.3, "vector": "AV:N/AC:M/Au:N/C:N/I:P/A:N"}}, {"lastseen": "2019-05-29T19:31:03", "bulletinFamily": "software", "cvelist": ["CVE-2016-5733"], "description": "## PMASA-2016-26\n\n**Announcement-ID:** PMASA-2016-26\n\n**Date:** 2016-06-23\n\n### Summary\n\nMultiple XSS vulnerabilities\n\n### Description\n\n * A vulnerability was reported allowing a specially crafted table name to cause an XSS attack through the functionality to check database privileges.\n * This XSS doesn't exist in some translations due to different quotes being used there (eg. Czech).\n * A vulnerability was reported allowing a specifically-configured MySQL server to execute an XSS attack. This particular attack requires configuring the MySQL server log_bin directive with the payload.\n * Several XSS vulnerabilities were found with the Transformation feature\n * Several XSS vulnerabilities were found in AJAX error handling\n * Several XSS vulnerabilities were found in the Designer feature\n * An XSS vulnerability was found in the charts feature\n * An XSS vulnerability was found in the zoom search feature\n\n### Severity\n\nWe consider these attacks to be of moderate severity.\n\n### Affected Versions\n\nAll 4.6.x versions (prior to 4.6.3), 4.4.x versions (prior to 4.4.15.7), and 4.0.x versions (prior to 4.0.10.16) are affected\n\n### Solution\n\nUpgrade to phpMyAdmin 4.6.3, 4.4.15.7, or 4.0.10.16 or newer or apply patches listed below.\n\n### References\n\nThanks to Emanuel Bronshtein [@e3amn2l](<https://twitter.com/e3amn2l>), Nils Juenemann [@totally_unknown](<https://twitter.com/totally_unknown>) and Mario Heiderich, Cure53 for reporting these vulnerabilities.\n\nAssigned CVE ids: [CVE-2016-5733](<https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5733>)\n\nCWE ids: [CWE-661](<https://cwe.mitre.org/data/definitions/661.html>)\n\n### Patches\n\nThe following commits have been made on the 4.0 branch to fix this issue:\n\n * [975089b](<https://github.com/phpmyadmin/phpmyadmin/commit/975089b>)\n * [f662d59](<https://github.com/phpmyadmin/phpmyadmin/commit/f662d59>)\n * [288efea](<https://github.com/phpmyadmin/phpmyadmin/commit/288efea>)\n * [02971f7](<https://github.com/phpmyadmin/phpmyadmin/commit/02971f7>)\n * [abfd979](<https://github.com/phpmyadmin/phpmyadmin/commit/abfd979>)\n * [b04150e](<https://github.com/phpmyadmin/phpmyadmin/commit/b04150e>)\n * [b974b56](<https://github.com/phpmyadmin/phpmyadmin/commit/b974b56>)\n * [9b6f64b](<https://github.com/phpmyadmin/phpmyadmin/commit/9b6f64b>)\n\nThe following commits have been made on the 4.4 branch to fix this issue:\n\n * [d184e4d](<https://github.com/phpmyadmin/phpmyadmin/commit/d184e4d>)\n * [e5ab397](<https://github.com/phpmyadmin/phpmyadmin/commit/e5ab397>)\n * [feb911e](<https://github.com/phpmyadmin/phpmyadmin/commit/feb911e>)\n * [c14709f](<https://github.com/phpmyadmin/phpmyadmin/commit/c14709f>)\n * [50bf399](<https://github.com/phpmyadmin/phpmyadmin/commit/50bf399>)\n * [42ff2c1](<https://github.com/phpmyadmin/phpmyadmin/commit/42ff2c1>)\n * [5b7a055](<https://github.com/phpmyadmin/phpmyadmin/commit/5b7a055>)\n * [98514fa](<https://github.com/phpmyadmin/phpmyadmin/commit/98514fa>)\n\nThe following commits have been made on the 4.6 branch to fix this issue:\n\n * [8716855](<https://github.com/phpmyadmin/phpmyadmin/commit/8716855>)\n * [d648ade](<https://github.com/phpmyadmin/phpmyadmin/commit/d648ade>)\n * [be3ecbb](<https://github.com/phpmyadmin/phpmyadmin/commit/be3ecbb>)\n * [895a131](<https://github.com/phpmyadmin/phpmyadmin/commit/895a131>)\n * [7966161](<https://github.com/phpmyadmin/phpmyadmin/commit/7966161>)\n * [615212a](<https://github.com/phpmyadmin/phpmyadmin/commit/615212a>)\n * [4d21b5c](<https://github.com/phpmyadmin/phpmyadmin/commit/4d21b5c>)\n * [960fd1f](<https://github.com/phpmyadmin/phpmyadmin/commit/960fd1f>)\n\n### More information\n\nFor further information and in case of questions, please contact the phpMyAdmin team. Our website is [ phpmyadmin.net](<https://www.phpmyadmin.net/>). \n", "edition": 2, "modified": "2016-06-23T00:00:00", "published": "2016-06-23T00:00:00", "id": "PHPMYADMIN:PMASA-2016-26", "href": "https://www.phpmyadmin.net/security/PMASA-2016-26/", "title": "Multiple XSS vulnerabilities", "type": "phpmyadmin", "cvss": {"score": 4.3, "vector": "AV:N/AC:M/Au:N/C:N/I:P/A:N"}}], "openvas": [{"lastseen": "2019-05-29T18:35:34", "bulletinFamily": "scanner", "cvelist": ["CVE-2016-5704", "CVE-2016-5702", "CVE-2016-5730", "CVE-2016-5731", "CVE-2016-5734", "CVE-2016-5705", "CVE-2016-5732", "CVE-2016-5703", "CVE-2016-5733", "CVE-2016-5739", "CVE-2016-5706"], "description": "This host is installed with phpMyAdmin\n and is prone to multiple vulnerabilities.", "modified": "2018-10-17T00:00:00", "published": "2016-07-04T00:00:00", "id": "OPENVAS:1361412562310808241", "href": "http://plugins.openvas.org/nasl.php?oid=1361412562310808241", "type": "openvas", "title": "phpMyAdmin Multiple Vulnerabilities -01 July16 (Windows)", "sourceData": "###############################################################################\n# OpenVAS Vulnerability Test\n# $Id: gb_phpmyadmin_mult_vuln01_july16_win.nasl 11938 2018-10-17 10:08:39Z asteins $\n#\n# phpMyAdmin Multiple Vulnerabilities -01 July16 (Windows)\n#\n# Authors:\n# Rinu Kuriakose <krinu@secpod.com>\n#\n# Copyright:\n# Copyright (C) 2016 Greenbone Networks GmbH, http://www.greenbone.net\n#\n# This program is free software; you can redistribute it and/or modify\n# it under the terms of the GNU General Public License version 2\n# (or any later version), as published by the Free Software Foundation.\n#\n# This program is distributed in the hope that it will be useful,\n# but WITHOUT ANY WARRANTY; without even the implied warranty of\n# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the\n# GNU General Public License for more details.\n#\n# You should have received a copy of the GNU General Public License\n# along with this program; if not, write to the Free Software\n# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.\n###############################################################################\n\nCPE = \"cpe:/a:phpmyadmin:phpmyadmin\";\n\nif(description)\n{\n script_oid(\"1.3.6.1.4.1.25623.1.0.808241\");\n script_version(\"$Revision: 11938 $\");\n script_cve_id(\"CVE-2016-5739\", \"CVE-2016-5733\", \"CVE-2016-5734\", \"CVE-2016-5731\",\n \"CVE-2016-5732\", \"CVE-2016-5730\", \"CVE-2016-5706\", \"CVE-2016-5704\",\n \"CVE-2016-5705\", \"CVE-2016-5703\", \"CVE-2016-5702\");\n script_tag(name:\"cvss_base\", value:\"7.5\");\n script_tag(name:\"cvss_base_vector\", value:\"AV:N/AC:L/Au:N/C:P/I:P/A:P\");\n script_tag(name:\"last_modification\", value:\"$Date: 2018-10-17 12:08:39 +0200 (Wed, 17 Oct 2018) $\");\n script_tag(name:\"creation_date\", value:\"2016-07-04 14:45:45 +0530 (Mon, 04 Jul 2016)\");\n script_tag(name:\"qod_type\", value:\"remote_banner\");\n script_name(\"phpMyAdmin Multiple Vulnerabilities -01 July16 (Windows)\");\n\n script_tag(name:\"summary\", value:\"This host is installed with phpMyAdmin\n and is prone to multiple vulnerabilities.\");\n\n script_tag(name:\"vuldetect\", value:\"Checks if a vulnerable version is present on the target host.\");\n\n script_tag(name:\"insight\", value:\"Multiple flaws are due to,\n\n - The Transformation implementation does not use the no-referrer Content\n Security Policy (CSP) protection mechanism.\n\n - Multiple input validation errors.\n\n - An improper selection of delimiters to prevent use of the preg_replace\n e (aka eval) modifier.\n\n - An improper handling of error messages.\n\n - An insufficient validation of 'scripts' parameter in 'js/get_scripts.js.php'\n script.\n\n - An improper sanitization of URI.\");\n\n script_tag(name:\"impact\", value:\"Successful exploitation will allow remote\n attackers to inject arbitrary web script or HTML or arbitrary PHP code via\n crafted parameters, execute arbitrary SQL commands, cause a denial of\n service, obtain sensitive information and conduct CSRF attacks.\");\n\n script_tag(name:\"affected\", value:\"phpMyAdmin versions 4.0.x before 4.0.10.16,\n 4.4.x before 4.4.15.7, and 4.6.x before 4.6.3 on Windows.\");\n\n script_tag(name:\"solution\", value:\"Upgrade to phpMyAdmin version 4.0.10.16 or\n 4.4.15.7 or 4.6.3 or later.\");\n\n script_tag(name:\"solution_type\", value:\"VendorFix\");\n\n script_xref(name:\"URL\", value:\"https://www.phpmyadmin.net/security/PMASA-2016-28\");\n script_xref(name:\"URL\", value:\"https://www.phpmyadmin.net/security/PMASA-2016-26\");\n script_xref(name:\"URL\", value:\"https://www.phpmyadmin.net/security/PMASA-2016-27\");\n script_xref(name:\"URL\", value:\"https://www.phpmyadmin.net/security/PMASA-2016-24\");\n\n script_category(ACT_GATHER_INFO);\n script_copyright(\"Copyright (C) 2016 Greenbone Networks GmbH\");\n script_family(\"Web application abuses\");\n script_dependencies(\"secpod_phpmyadmin_detect_900129.nasl\", \"os_detection.nasl\");\n script_mandatory_keys(\"phpMyAdmin/installed\", \"Host/runs_windows\");\n script_require_ports(\"Services/www\", 80);\n exit(0);\n}\n\n\ninclude(\"version_func.inc\");\ninclude(\"host_details.inc\");\n\nif(!phpPort = get_app_port(cpe:CPE)) exit(0);\n\nif(!phpVer = get_app_version(cpe:CPE, port:phpPort)) exit(0);\n\nif(phpVer =~ \"^(4\\.0)\")\n{\n if(version_is_less(version:phpVer, test_version:\"4.0.10.16\"))\n {\n fix = \"4.0.10.16\";\n VULN = TRUE;\n }\n}\n\nelse if(phpVer =~ \"^(4\\.4)\")\n{\n if(version_is_less(version:phpVer, test_version:\"4.4.15.7\"))\n {\n fix = \"4.4.15.7\";\n VULN = TRUE;\n }\n}\n\nelse if(phpVer =~ \"^(4\\.6)\")\n{\n if(version_is_less(version:phpVer, test_version:\"4.6.3\"))\n {\n fix = \"4.6.3\";\n VULN = TRUE;\n }\n}\n\nif(VULN)\n{\n report = report_fixed_ver(installed_version:phpVer, fixed_version:fix);\n security_message(port:phpPort, data:report);\n exit(0);\n}\n", "cvss": {"score": 7.5, "vector": "AV:N/AC:L/Au:N/C:P/I:P/A:P"}}, {"lastseen": "2019-05-29T18:35:12", "bulletinFamily": "scanner", "cvelist": ["CVE-2016-5704", "CVE-2016-5702", "CVE-2016-5730", "CVE-2016-5731", "CVE-2016-5734", "CVE-2016-5705", "CVE-2016-5732", "CVE-2016-5703", "CVE-2016-5733", "CVE-2016-5739", "CVE-2016-5706"], "description": "This host is installed with phpMyAdmin\n and is prone to multiple vulnerabilities.", "modified": "2018-11-12T00:00:00", "published": "2016-07-04T00:00:00", "id": "OPENVAS:1361412562310808242", "href": "http://plugins.openvas.org/nasl.php?oid=1361412562310808242", "type": "openvas", "title": "phpMyAdmin Multiple Vulnerabilities -01 July16 (Linux)", "sourceData": "###############################################################################\n# OpenVAS Vulnerability Test\n# $Id: gb_phpmyadmin_mult_vuln01_july16_lin.nasl 12313 2018-11-12 08:53:51Z asteins $\n#\n# phpMyAdmin Multiple Vulnerabilities -01 July16 (Linux)\n#\n# Authors:\n# Rinu Kuriakose <krinu@secpod.com>\n#\n# Copyright:\n# Copyright (C) 2016 Greenbone Networks GmbH, http://www.greenbone.net\n#\n# This program is free software; you can redistribute it and/or modify\n# it under the terms of the GNU General Public License version 2\n# (or any later version), as published by the Free Software Foundation.\n#\n# This program is distributed in the hope that it will be useful,\n# but WITHOUT ANY WARRANTY; without even the implied warranty of\n# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the\n# GNU General Public License for more details.\n#\n# You should have received a copy of the GNU General Public License\n# along with this program; if not, write to the Free Software\n# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.\n###############################################################################\n\nCPE = \"cpe:/a:phpmyadmin:phpmyadmin\";\n\nif(description)\n{\n script_oid(\"1.3.6.1.4.1.25623.1.0.808242\");\n script_version(\"$Revision: 12313 $\");\n script_cve_id(\"CVE-2016-5739\", \"CVE-2016-5733\", \"CVE-2016-5734\", \"CVE-2016-5731\",\n \"CVE-2016-5732\", \"CVE-2016-5730\", \"CVE-2016-5706\", \"CVE-2016-5704\",\n \"CVE-2016-5705\", \"CVE-2016-5703\", \"CVE-2016-5702\");\n script_tag(name:\"cvss_base\", value:\"7.5\");\n script_tag(name:\"cvss_base_vector\", value:\"AV:N/AC:L/Au:N/C:P/I:P/A:P\");\n script_tag(name:\"last_modification\", value:\"$Date: 2018-11-12 09:53:51 +0100 (Mon, 12 Nov 2018) $\");\n script_tag(name:\"creation_date\", value:\"2016-07-04 14:45:45 +0530 (Mon, 04 Jul 2016)\");\n script_tag(name:\"qod_type\", value:\"remote_banner_unreliable\");\n script_name(\"phpMyAdmin Multiple Vulnerabilities -01 July16 (Linux)\");\n\n script_tag(name:\"summary\", value:\"This host is installed with phpMyAdmin\n and is prone to multiple vulnerabilities.\");\n\n script_tag(name:\"vuldetect\", value:\"Checks if a vulnerable version is present on the target host.\");\n\n script_tag(name:\"insight\", value:\"Multiple flaws are due to,\n\n - The Transformation implementation does not use the no-referrer Content\n Security Policy (CSP) protection mechanism.\n\n - Multiple input validation errors.\n\n - An improper selection of delimiters to prevent use of the preg_replace\n e (aka eval) modifier.\n\n - An improper handling of error messages.\n\n - An insufficient validation of 'scripts' parameter in 'js/get_scripts.js.php'\n script.\n\n - An improper sanitization of URI.\");\n\n script_tag(name:\"impact\", value:\"Successful exploitation will allow remote\n attackers to inject arbitrary web script or HTML or arbitrary PHP code via\n crafted parameters, execute arbitrary SQL commands, cause a denial of\n service, obtain sensitive information and conduct CSRF attacks.\");\n\n script_tag(name:\"affected\", value:\"phpMyAdmin versions 4.0.x before 4.0.10.16,\n 4.4.x before 4.4.15.7, and 4.6.x before 4.6.3 on Linux.\");\n\n script_tag(name:\"solution\", value:\"Upgrade to phpMyAdmin version 4.0.10.16 or\n 4.4.15.7 or 4.6.3 or later.\");\n\n script_tag(name:\"solution_type\", value:\"VendorFix\");\n\n script_xref(name:\"URL\", value:\"https://www.phpmyadmin.net/security/PMASA-2016-28\");\n script_xref(name:\"URL\", value:\"https://www.phpmyadmin.net/security/PMASA-2016-26\");\n script_xref(name:\"URL\", value:\"https://www.phpmyadmin.net/security/PMASA-2016-27\");\n script_xref(name:\"URL\", value:\"https://www.phpmyadmin.net/security/PMASA-2016-24\");\n\n script_category(ACT_GATHER_INFO);\n script_copyright(\"Copyright (C) 2016 Greenbone Networks GmbH\");\n script_family(\"Web application abuses\");\n script_dependencies(\"secpod_phpmyadmin_detect_900129.nasl\", \"os_detection.nasl\");\n script_mandatory_keys(\"phpMyAdmin/installed\", \"Host/runs_unixoide\");\n script_require_ports(\"Services/www\", 80);\n exit(0);\n}\n\n\ninclude(\"version_func.inc\");\ninclude(\"host_details.inc\");\n\nif(!phpPort = get_app_port(cpe:CPE)) exit(0);\n\nif(!phpVer = get_app_version(cpe:CPE, port:phpPort)) exit(0);\n\nif(phpVer =~ \"^(4\\.0)\")\n{\n if(version_is_less(version:phpVer, test_version:\"4.0.10.16\"))\n {\n fix = \"4.0.10.16\";\n VULN = TRUE;\n }\n}\n\nelse if(phpVer =~ \"^(4\\.4)\")\n{\n if(version_is_less(version:phpVer, test_version:\"4.4.15.7\"))\n {\n fix = \"4.4.15.7\";\n VULN = TRUE;\n }\n}\n\nelse if(phpVer =~ \"^(4\\.6)\")\n{\n if(version_is_less(version:phpVer, test_version:\"4.6.3\"))\n {\n fix = \"4.6.3\";\n VULN = TRUE;\n }\n}\n\nif(VULN)\n{\n report = report_fixed_ver(installed_version:phpVer, fixed_version:fix);\n security_message(port:phpPort, data:report);\n exit(0);\n}\n", "cvss": {"score": 7.5, "vector": "AV:N/AC:L/Au:N/C:P/I:P/A:P"}}, {"lastseen": "2019-05-29T18:35:14", "bulletinFamily": "scanner", "cvelist": ["CVE-2016-5704", "CVE-2016-5702", "CVE-2016-5701", "CVE-2016-5730", "CVE-2016-5731", "CVE-2016-5734", "CVE-2016-5705", "CVE-2016-5732", "CVE-2016-5703", "CVE-2016-5733", "CVE-2016-5739", "CVE-2016-5706"], "description": "The remote host is missing an update for the ", "modified": "2019-03-15T00:00:00", "published": "2016-06-28T00:00:00", "id": "OPENVAS:1361412562310808496", "href": "http://plugins.openvas.org/nasl.php?oid=1361412562310808496", "type": "openvas", "title": "Fedora Update for phpMyAdmin FEDORA-2016-81c2dabf20", "sourceData": "###############################################################################\n# OpenVAS Vulnerability Test\n#\n# Fedora Update for phpMyAdmin FEDORA-2016-81c2dabf20\n#\n# Authors:\n# System Generated Check\n#\n# Copyright:\n# Copyright (C) 2016 Greenbone Networks GmbH, http://www.greenbone.net\n#\n# This program is free software; you can redistribute it and/or modify\n# it under the terms of the GNU General Public License version 2\n# (or any later version), as published by the Free Software Foundation.\n#\n# This program is distributed in the hope that it will be useful,\n# but WITHOUT ANY WARRANTY; without even the implied warranty of\n# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the\n# GNU General Public License for more details.\n#\n# You should have received a copy of the GNU General Public License\n# along with this program; if not, write to the Free Software\n# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.\n###############################################################################\n\nif(description)\n{\n script_oid(\"1.3.6.1.4.1.25623.1.0.808496\");\n script_version(\"$Revision: 14223 $\");\n script_tag(name:\"last_modification\", value:\"$Date: 2019-03-15 14:49:35 +0100 (Fri, 15 Mar 2019) $\");\n script_tag(name:\"creation_date\", value:\"2016-06-28 06:03:25 +0200 (Tue, 28 Jun 2016)\");\n script_cve_id(\"CVE-2016-5701\", \"CVE-2016-5702\", \"CVE-2016-5703\", \"CVE-2016-5704\",\n \"CVE-2016-5705\", \"CVE-2016-5706\", \"CVE-2016-5730\", \"CVE-2016-5731\",\n \"CVE-2016-5732\", \"CVE-2016-5733\", \"CVE-2016-5734\", \"CVE-2016-5739\");\n script_tag(name:\"cvss_base\", value:\"7.5\");\n script_tag(name:\"cvss_base_vector\", value:\"AV:N/AC:L/Au:N/C:P/I:P/A:P\");\n script_tag(name:\"qod_type\", value:\"package\");\n script_name(\"Fedora Update for phpMyAdmin FEDORA-2016-81c2dabf20\");\n script_tag(name:\"summary\", value:\"The remote host is missing an update for the 'phpMyAdmin'\n package(s) announced via the referenced advisory.\");\n script_tag(name:\"vuldetect\", value:\"Checks if a vulnerable version is present on the target host.\");\n script_tag(name:\"affected\", value:\"phpMyAdmin on Fedora 24\");\n script_tag(name:\"solution\", value:\"Please install the updated package(s).\");\n script_xref(name:\"FEDORA\", value:\"2016-81c2dabf20\");\n script_xref(name:\"URL\", value:\"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/V2WPA5BHQATXRSE6L3ABAMFKBKSEUWGH\");\n script_tag(name:\"solution_type\", value:\"VendorFix\");\n script_category(ACT_GATHER_INFO);\n script_copyright(\"Copyright (C) 2016 Greenbone Networks GmbH\");\n script_family(\"Fedora Local Security Checks\");\n script_dependencies(\"gather-package-list.nasl\");\n script_mandatory_keys(\"ssh/login/fedora\", \"ssh/login/rpms\", re:\"ssh/login/release=FC24\");\n\n exit(0);\n}\n\ninclude(\"revisions-lib.inc\");\ninclude(\"pkg-lib-rpm.inc\");\n\nrelease = rpm_get_ssh_release();\nif(!release)\n exit(0);\n\nres = \"\";\n\nif(release == \"FC24\")\n{\n\n if ((res = isrpmvuln(pkg:\"phpMyAdmin\", rpm:\"phpMyAdmin~4.6.3~1.fc24\", rls:\"FC24\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if (__pkg_match) exit(99);\n exit(0);\n}\n", "cvss": {"score": 7.5, "vector": "AV:N/AC:L/Au:N/C:P/I:P/A:P"}}, {"lastseen": "2019-05-29T18:35:06", "bulletinFamily": "scanner", "cvelist": ["CVE-2016-5704", "CVE-2016-5702", "CVE-2016-5701", "CVE-2016-5730", "CVE-2016-5731", "CVE-2016-5734", "CVE-2016-5705", "CVE-2016-5732", "CVE-2016-5703", "CVE-2016-5733", "CVE-2016-5739", "CVE-2016-5706"], "description": "The remote host is missing an update for the ", "modified": "2019-03-15T00:00:00", "published": "2016-07-10T00:00:00", "id": "OPENVAS:1361412562310808554", "href": "http://plugins.openvas.org/nasl.php?oid=1361412562310808554", "type": "openvas", "title": "Fedora Update for phpMyAdmin FEDORA-2016-9df3915036", "sourceData": "###############################################################################\n# OpenVAS Vulnerability Test\n#\n# Fedora Update for phpMyAdmin FEDORA-2016-9df3915036\n#\n# Authors:\n# System Generated Check\n#\n# Copyright:\n# Copyright (C) 2016 Greenbone Networks GmbH, http://www.greenbone.net\n#\n# This program is free software; you can redistribute it and/or modify\n# it under the terms of the GNU General Public License version 2\n# (or any later version), as published by the Free Software Foundation.\n#\n# This program is distributed in the hope that it will be useful,\n# but WITHOUT ANY WARRANTY; without even the implied warranty of\n# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the\n# GNU General Public License for more details.\n#\n# You should have received a copy of the GNU General Public License\n# along with this program; if not, write to the Free Software\n# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.\n###############################################################################\n\nif(description)\n{\n script_oid(\"1.3.6.1.4.1.25623.1.0.808554\");\n script_version(\"$Revision: 14223 $\");\n script_tag(name:\"last_modification\", value:\"$Date: 2019-03-15 14:49:35 +0100 (Fri, 15 Mar 2019) $\");\n script_tag(name:\"creation_date\", value:\"2016-07-10 07:19:41 +0200 (Sun, 10 Jul 2016)\");\n script_cve_id(\"CVE-2016-5701\", \"CVE-2016-5702\", \"CVE-2016-5703\", \"CVE-2016-5704\",\n \"CVE-2016-5705\", \"CVE-2016-5706\", \"CVE-2016-5730\", \"CVE-2016-5731\",\n \"CVE-2016-5732\", \"CVE-2016-5733\", \"CVE-2016-5734\", \"CVE-2016-5739\");\n script_tag(name:\"cvss_base\", value:\"7.5\");\n script_tag(name:\"cvss_base_vector\", value:\"AV:N/AC:L/Au:N/C:P/I:P/A:P\");\n script_tag(name:\"qod_type\", value:\"package\");\n script_name(\"Fedora Update for phpMyAdmin FEDORA-2016-9df3915036\");\n script_tag(name:\"summary\", value:\"The remote host is missing an update for the 'phpMyAdmin'\n package(s) announced via the referenced advisory.\");\n script_tag(name:\"vuldetect\", value:\"Checks if a vulnerable version is present on the target host.\");\n script_tag(name:\"affected\", value:\"phpMyAdmin on Fedora 23\");\n script_tag(name:\"solution\", value:\"Please install the updated package(s).\");\n script_xref(name:\"FEDORA\", value:\"2016-9df3915036\");\n script_xref(name:\"URL\", value:\"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/6Z2FFVPPDOHVJ4K4LDVUHUNCMQ6SGVCJ\");\n script_tag(name:\"solution_type\", value:\"VendorFix\");\n script_category(ACT_GATHER_INFO);\n script_copyright(\"Copyright (C) 2016 Greenbone Networks GmbH\");\n script_family(\"Fedora Local Security Checks\");\n script_dependencies(\"gather-package-list.nasl\");\n script_mandatory_keys(\"ssh/login/fedora\", \"ssh/login/rpms\", re:\"ssh/login/release=FC23\");\n\n exit(0);\n}\n\ninclude(\"revisions-lib.inc\");\ninclude(\"pkg-lib-rpm.inc\");\n\nrelease = rpm_get_ssh_release();\nif(!release)\n exit(0);\n\nres = \"\";\n\nif(release == \"FC23\")\n{\n\n if ((res = isrpmvuln(pkg:\"phpMyAdmin\", rpm:\"phpMyAdmin~4.6.3~1.fc23\", rls:\"FC23\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if (__pkg_match) exit(99);\n exit(0);\n}\n", "cvss": {"score": 7.5, "vector": "AV:N/AC:L/Au:N/C:P/I:P/A:P"}}, {"lastseen": "2019-05-29T18:35:44", "bulletinFamily": "scanner", "cvelist": ["CVE-2016-5704", "CVE-2016-5702", "CVE-2016-5701", "CVE-2016-5730", "CVE-2016-5731", "CVE-2016-5734", "CVE-2016-5705", "CVE-2016-5732", "CVE-2016-5703", "CVE-2016-5733", "CVE-2016-5739", "CVE-2016-5706"], "description": "The remote host is missing an update for the ", "modified": "2019-03-15T00:00:00", "published": "2016-07-10T00:00:00", "id": "OPENVAS:1361412562310808562", "href": "http://plugins.openvas.org/nasl.php?oid=1361412562310808562", "type": "openvas", "title": "Fedora Update for phpMyAdmin FEDORA-2016-56ee5cb8b6", "sourceData": "###############################################################################\n# OpenVAS Vulnerability Test\n#\n# Fedora Update for phpMyAdmin FEDORA-2016-56ee5cb8b6\n#\n# Authors:\n# System Generated Check\n#\n# Copyright:\n# Copyright (C) 2016 Greenbone Networks GmbH, http://www.greenbone.net\n#\n# This program is free software; you can redistribute it and/or modify\n# it under the terms of the GNU General Public License version 2\n# (or any later version), as published by the Free Software Foundation.\n#\n# This program is distributed in the hope that it will be useful,\n# but WITHOUT ANY WARRANTY; without even the implied warranty of\n# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the\n# GNU General Public License for more details.\n#\n# You should have received a copy of the GNU General Public License\n# along with this program; if not, write to the Free Software\n# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.\n###############################################################################\n\nif(description)\n{\n script_oid(\"1.3.6.1.4.1.25623.1.0.808562\");\n script_version(\"$Revision: 14223 $\");\n script_tag(name:\"last_modification\", value:\"$Date: 2019-03-15 14:49:35 +0100 (Fri, 15 Mar 2019) $\");\n script_tag(name:\"creation_date\", value:\"2016-07-10 07:20:32 +0200 (Sun, 10 Jul 2016)\");\n script_cve_id(\"CVE-2016-5701\", \"CVE-2016-5702\", \"CVE-2016-5703\", \"CVE-2016-5704\",\n \"CVE-2016-5705\", \"CVE-2016-5706\", \"CVE-2016-5730\", \"CVE-2016-5731\",\n \"CVE-2016-5732\", \"CVE-2016-5733\", \"CVE-2016-5734\", \"CVE-2016-5739\");\n script_tag(name:\"cvss_base\", value:\"7.5\");\n script_tag(name:\"cvss_base_vector\", value:\"AV:N/AC:L/Au:N/C:P/I:P/A:P\");\n script_tag(name:\"qod_type\", value:\"package\");\n script_name(\"Fedora Update for phpMyAdmin FEDORA-2016-56ee5cb8b6\");\n script_tag(name:\"summary\", value:\"The remote host is missing an update for the 'phpMyAdmin'\n package(s) announced via the referenced advisory.\");\n script_tag(name:\"vuldetect\", value:\"Checks if a vulnerable version is present on the target host.\");\n script_tag(name:\"affected\", value:\"phpMyAdmin on Fedora 22\");\n script_tag(name:\"solution\", value:\"Please install the updated package(s).\");\n script_xref(name:\"FEDORA\", value:\"2016-56ee5cb8b6\");\n script_xref(name:\"URL\", value:\"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/NGXG2DY7K3ROTZS4J4MSJ544UQG3FRC3\");\n script_tag(name:\"solution_type\", value:\"VendorFix\");\n script_category(ACT_GATHER_INFO);\n script_copyright(\"Copyright (C) 2016 Greenbone Networks GmbH\");\n script_family(\"Fedora Local Security Checks\");\n script_dependencies(\"gather-package-list.nasl\");\n script_mandatory_keys(\"ssh/login/fedora\", \"ssh/login/rpms\", re:\"ssh/login/release=FC22\");\n\n exit(0);\n}\n\ninclude(\"revisions-lib.inc\");\ninclude(\"pkg-lib-rpm.inc\");\n\nrelease = rpm_get_ssh_release();\nif(!release)\n exit(0);\n\nres = \"\";\n\nif(release == \"FC22\")\n{\n\n if ((res = isrpmvuln(pkg:\"phpMyAdmin\", rpm:\"phpMyAdmin~4.6.3~1.fc22\", rls:\"FC22\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if (__pkg_match) exit(99);\n exit(0);\n}\n", "cvss": {"score": 7.5, "vector": "AV:N/AC:L/Au:N/C:P/I:P/A:P"}}, {"lastseen": "2017-07-24T12:55:09", "bulletinFamily": "scanner", "cvelist": ["CVE-2016-2040", "CVE-2016-5701", "CVE-2016-5731", "CVE-2016-2561", "CVE-2016-5705", "CVE-2016-1927", "CVE-2016-5099", "CVE-2016-2560", "CVE-2016-2039", "CVE-2016-5733", "CVE-2016-2041", "CVE-2016-5739", "CVE-2016-5706"], "description": "Several vulnerabilities have been fixed in\nphpMyAdmin, the web-based MySQL administration interface.\n\nCVE-2016-1927 \nThe suggestPassword function relied on a non-secure random number\ngenerator which makes it easier for remote attackers to guess\ngenerated passwords via a brute-force approach.\n\nCVE-2016-2039 \nCSRF token values were generated by a non-secure random number\ngenerator, which allows remote attackers to bypass intended access\nrestrictions by predicting a value.\n\nCVE-2016-2040 \nMultiple cross-site scripting (XSS) vulnerabilities allow remote\nauthenticated users to inject arbitrary web script or HTML.\n\nCVE-2016-2041 \nphpMyAdmin does not use a constant-time algorithm for comparing\nCSRF tokens, which makes it easier for remote attackers to bypass\nintended access restrictions by measuring time differences.\n\nCVE-2016-2560 \nMultiple cross-site scripting (XSS) vulnerabilities allow remote\nattackers to inject arbitrary web script or HTML.\n\nCVE-2016-2561 \nMultiple cross-site scripting (XSS) vulnerabilities allow remote\nattackers to inject arbitrary web script or HTML.\n\nCVE-2016-5099 \nMultiple cross-site scripting (XSS) vulnerabilities allow remote\nattackers to inject arbitrary web script or HTML.\n\nCVE-2016-5701 \nFor installations running on plain HTTP, phpMyAdmin allows remote\nattackers to conduct BBCode injection attacks against HTTP sessions\nvia a crafted URI.\n\nCVE-2016-5705 \nMultiple cross-site scripting (XSS) vulnerabilities allow remote\nattackers to inject arbitrary web script or HTML.\n\nCVE-2016-5706 \nphpMyAdmin allows remote attackers to cause a denial of service\n(resource consumption) via a large array in the scripts parameter.\n\nCVE-2016-5731 \nA cross-site scripting (XSS) vulnerability allows remote\nattackers to inject arbitrary web script or HTML.\n\nCVE-2016-5733 \nMultiple cross-site scripting (XSS) vulnerabilities allow remote\nattackers to inject arbitrary web script or HTML.\n\nCVE-2016-5739 \nA specially crafted Transformation could leak information which\na remote attacker could use to perform cross site request forgeries.", "modified": "2017-07-07T00:00:00", "published": "2016-08-02T00:00:00", "id": "OPENVAS:703627", "href": "http://plugins.openvas.org/nasl.php?oid=703627", "type": "openvas", "title": "Debian Security Advisory DSA 3627-1 (phpmyadmin - security update)", "sourceData": "# OpenVAS Vulnerability Test\n# $Id: deb_3627.nasl 6608 2017-07-07 12:05:05Z cfischer $\n# Auto-generated from advisory DSA 3627-1 using nvtgen 1.0\n# Script version: 1.0\n#\n# Author:\n# Greenbone Networks\n#\n# Copyright:\n# Copyright (c) 2016 Greenbone Networks GmbH http://greenbone.net\n# Text descriptions are largely excerpted from the referenced\n# advisory, and are Copyright (c) the respective author(s)\n#\n# This program is free software; you can redistribute it and/or\n# modify it under the terms of the GNU General Public License\n# as published by the Free Software Foundation; either version 2\n# of the License, or (at your option) any later version.\n#\n# This program is distributed in the hope that it will be useful,\n# but WITHOUT ANY WARRANTY; without even the implied warranty of\n# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the\n# GNU General Public License for more details.\n#\n# You should have received a copy of the GNU General Public License\n# along with this program; if not, write to the Free Software\n# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.\n#\n\n\nif(description)\n{\n script_id(703627);\n script_version(\"$Revision: 6608 $\");\n script_cve_id(\"CVE-2016-1927\", \"CVE-2016-2039\", \"CVE-2016-2040\", \"CVE-2016-2041\",\n \"CVE-2016-2560\", \"CVE-2016-2561\", \"CVE-2016-5099\", \"CVE-2016-5701\",\n \"CVE-2016-5705\", \"CVE-2016-5706\", \"CVE-2016-5731\", \"CVE-2016-5733\",\n \"CVE-2016-5739\");\n script_name(\"Debian Security Advisory DSA 3627-1 (phpmyadmin - security update)\");\n script_tag(name: \"last_modification\", value: \"$Date: 2017-07-07 14:05:05 +0200 (Fri, 07 Jul 2017) $\");\n script_tag(name:\"creation_date\", value:\"2016-08-02 10:58:14 +0530 (Tue, 02 Aug 2016)\");\n script_tag(name:\"cvss_base\", value:\"5.0\");\n script_tag(name:\"cvss_base_vector\", value:\"AV:N/AC:L/Au:N/C:P/I:N/A:N\");\n script_tag(name: \"solution_type\", value: \"VendorFix\");\n script_tag(name: \"qod_type\", value: \"package\");\n\n script_xref(name: \"URL\", value: \"http://www.debian.org/security/2016/dsa-3627.html\");\n\n\n script_category(ACT_GATHER_INFO);\n\n script_copyright(\"Copyright (c) 2016 Greenbone Networks GmbH http://greenbone.net\");\n script_family(\"Debian Local Security Checks\");\n script_dependencies(\"gather-package-list.nasl\");\n script_mandatory_keys(\"ssh/login/debian_linux\", \"ssh/login/packages\");\n script_tag(name: \"affected\", value: \"phpmyadmin on Debian Linux\");\n script_tag(name: \"insight\", value: \"This package allows administering of MySQL\nor MariaDB with a web interface.\");\n script_tag(name: \"solution\", value: \"For the stable distribution (jessie),\nthese problems have been fixed in version 4:4.2.12-2+deb8u2.\n\nFor the unstable distribution (sid), these problems have been fixed in\nversion 4:4.6.3-1.\n\nWe recommend that you upgrade your phpmyadmin packages.\");\n script_tag(name: \"summary\", value: \"Several vulnerabilities have been fixed in\nphpMyAdmin, the web-based MySQL administration interface.\n\nCVE-2016-1927 \nThe suggestPassword function relied on a non-secure random number\ngenerator which makes it easier for remote attackers to guess\ngenerated passwords via a brute-force approach.\n\nCVE-2016-2039 \nCSRF token values were generated by a non-secure random number\ngenerator, which allows remote attackers to bypass intended access\nrestrictions by predicting a value.\n\nCVE-2016-2040 \nMultiple cross-site scripting (XSS) vulnerabilities allow remote\nauthenticated users to inject arbitrary web script or HTML.\n\nCVE-2016-2041 \nphpMyAdmin does not use a constant-time algorithm for comparing\nCSRF tokens, which makes it easier for remote attackers to bypass\nintended access restrictions by measuring time differences.\n\nCVE-2016-2560 \nMultiple cross-site scripting (XSS) vulnerabilities allow remote\nattackers to inject arbitrary web script or HTML.\n\nCVE-2016-2561 \nMultiple cross-site scripting (XSS) vulnerabilities allow remote\nattackers to inject arbitrary web script or HTML.\n\nCVE-2016-5099 \nMultiple cross-site scripting (XSS) vulnerabilities allow remote\nattackers to inject arbitrary web script or HTML.\n\nCVE-2016-5701 \nFor installations running on plain HTTP, phpMyAdmin allows remote\nattackers to conduct BBCode injection attacks against HTTP sessions\nvia a crafted URI.\n\nCVE-2016-5705 \nMultiple cross-site scripting (XSS) vulnerabilities allow remote\nattackers to inject arbitrary web script or HTML.\n\nCVE-2016-5706 \nphpMyAdmin allows remote attackers to cause a denial of service\n(resource consumption) via a large array in the scripts parameter.\n\nCVE-2016-5731 \nA cross-site scripting (XSS) vulnerability allows remote\nattackers to inject arbitrary web script or HTML.\n\nCVE-2016-5733 \nMultiple cross-site scripting (XSS) vulnerabilities allow remote\nattackers to inject arbitrary web script or HTML.\n\nCVE-2016-5739 \nA specially crafted Transformation could leak information which\na remote attacker could use to perform cross site request forgeries.\");\n script_tag(name: \"vuldetect\", value: \"This check tests the installed software\nversion using the apt package manager.\");\n exit(0);\n}\n\ninclude(\"revisions-lib.inc\");\ninclude(\"pkg-lib-deb.inc\");\n\nres = \"\";\nreport = \"\";\nif ((res = isdpkgvuln(pkg:\"phpmyadmin\", ver:\"4:4.2.12-2+deb8u2\", rls_regex:\"DEB8.[0-9]+\")) != NULL) {\n report += res;\n}\n\nif (report != \"\") {\n security_message(data:report);\n} else if (__pkg_match) {\n exit(99); # Not vulnerable.\n}\n", "cvss": {"score": 5.0, "vector": "AV:NETWORK/AC:LOW/Au:NONE/C:PARTIAL/I:NONE/A:NONE/"}}, {"lastseen": "2019-05-29T18:35:41", "bulletinFamily": "scanner", "cvelist": ["CVE-2016-2040", "CVE-2016-5701", "CVE-2016-5731", "CVE-2016-2561", "CVE-2016-5705", "CVE-2016-1927", "CVE-2016-5099", "CVE-2016-2560", "CVE-2016-2039", "CVE-2016-5733", "CVE-2016-2041", "CVE-2016-5739", "CVE-2016-5706"], "description": "Several vulnerabilities have been fixed in\nphpMyAdmin, the web-based MySQL administration interface.\n\nCVE-2016-1927\nThe suggestPassword function relied on a non-secure random number\ngenerator which makes it easier for remote attackers to guess\ngenerated passwords via a brute-force approach.\n\nCVE-2016-2039\nCSRF token values were generated by a non-secure random number\ngenerator, which allows remote attackers to bypass intended access\nrestrictions by predicting a value.\n\nCVE-2016-2040\nMultiple cross-site scripting (XSS) vulnerabilities allow remote\nauthenticated users to inject arbitrary web script or HTML.\n\nCVE-2016-2041\nphpMyAdmin does not use a constant-time algorithm for comparing\nCSRF tokens, which makes it easier for remote attackers to bypass\nintended access restrictions by measuring time differences.\n\nCVE-2016-2560\nMultiple cross-site scripting (XSS) vulnerabilities allow remote\nattackers to inject arbitrary web script or HTML.\n\nCVE-2016-2561\nMultiple cross-site scripting (XSS) vulnerabilities allow remote\nattackers to inject arbitrary web script or HTML.\n\nCVE-2016-5099\nMultiple cross-site scripting (XSS) vulnerabilities allow remote\nattackers to inject arbitrary web script or HTML.\n\nCVE-2016-5701\nFor installations running on plain HTTP, phpMyAdmin allows remote\nattackers to conduct BBCode injection attacks against HTTP sessions\nvia a crafted URI.\n\nCVE-2016-5705\nMultiple cross-site scripting (XSS) vulnerabilities allow remote\nattackers to inject arbitrary web script or HTML.\n\nCVE-2016-5706\nphpMyAdmin allows remote attackers to cause a denial of service\n(resource consumption) via a large array in the scripts parameter.\n\nCVE-2016-5731\nA cross-site scripting (XSS) vulnerability allows remote\nattackers to inject arbitrary web script or HTML.\n\nCVE-2016-5733\nMultiple cross-site scripting (XSS) vulnerabilities allow remote\nattackers to inject arbitrary web script or HTML.\n\nCVE-2016-5739\nA specially crafted Transformation could leak information which\na remote attacker could use to perform cross site request forgeries.", "modified": "2019-03-18T00:00:00", "published": "2016-08-02T00:00:00", "id": "OPENVAS:1361412562310703627", "href": "http://plugins.openvas.org/nasl.php?oid=1361412562310703627", "type": "openvas", "title": "Debian Security Advisory DSA 3627-1 (phpmyadmin - security update)", "sourceData": "# OpenVAS Vulnerability Test\n# $Id: deb_3627.nasl 14279 2019-03-18 14:48:34Z cfischer $\n# Auto-generated from advisory DSA 3627-1 using nvtgen 1.0\n# Script version: 1.0\n#\n# Author:\n# Greenbone Networks\n#\n# Copyright:\n# Copyright (c) 2016 Greenbone Networks GmbH http://greenbone.net\n# Text descriptions are largely excerpted from the referenced\n# advisory, and are Copyright (c) the respective author(s)\n#\n# This program is free software; you can redistribute it and/or\n# modify it under the terms of the GNU General Public License\n# as published by the Free Software Foundation; either version 2\n# of the License, or (at your option) any later version.\n#\n# This program is distributed in the hope that it will be useful,\n# but WITHOUT ANY WARRANTY; without even the implied warranty of\n# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the\n# GNU General Public License for more details.\n#\n# You should have received a copy of the GNU General Public License\n# along with this program; if not, write to the Free Software\n# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.\n#\n\nif(description)\n{\n script_oid(\"1.3.6.1.4.1.25623.1.0.703627\");\n script_version(\"$Revision: 14279 $\");\n script_cve_id(\"CVE-2016-1927\", \"CVE-2016-2039\", \"CVE-2016-2040\", \"CVE-2016-2041\",\n \"CVE-2016-2560\", \"CVE-2016-2561\", \"CVE-2016-5099\", \"CVE-2016-5701\",\n \"CVE-2016-5705\", \"CVE-2016-5706\", \"CVE-2016-5731\", \"CVE-2016-5733\",\n \"CVE-2016-5739\");\n script_name(\"Debian Security Advisory DSA 3627-1 (phpmyadmin - security update)\");\n script_tag(name:\"last_modification\", value:\"$Date: 2019-03-18 15:48:34 +0100 (Mon, 18 Mar 2019) $\");\n script_tag(name:\"creation_date\", value:\"2016-08-02 10:58:14 +0530 (Tue, 02 Aug 2016)\");\n script_tag(name:\"cvss_base\", value:\"5.0\");\n script_tag(name:\"cvss_base_vector\", value:\"AV:N/AC:L/Au:N/C:P/I:N/A:N\");\n script_tag(name:\"solution_type\", value:\"VendorFix\");\n script_tag(name:\"qod_type\", value:\"package\");\n\n script_xref(name:\"URL\", value:\"http://www.debian.org/security/2016/dsa-3627.html\");\n\n script_category(ACT_GATHER_INFO);\n script_copyright(\"Copyright (c) 2016 Greenbone Networks GmbH http://greenbone.net\");\n script_family(\"Debian Local Security Checks\");\n script_dependencies(\"gather-package-list.nasl\");\n script_mandatory_keys(\"ssh/login/debian_linux\", \"ssh/login/packages\", re:\"ssh/login/release=DEB8\");\n script_tag(name:\"affected\", value:\"phpmyadmin on Debian Linux\");\n script_tag(name:\"solution\", value:\"For the stable distribution (jessie),\nthese problems have been fixed in version 4:4.2.12-2+deb8u2.\n\nFor the unstable distribution (sid), these problems have been fixed in\nversion 4:4.6.3-1.\n\nWe recommend that you upgrade your phpmyadmin packages.\");\n script_tag(name:\"summary\", value:\"Several vulnerabilities have been fixed in\nphpMyAdmin, the web-based MySQL administration interface.\n\nCVE-2016-1927\nThe suggestPassword function relied on a non-secure random number\ngenerator which makes it easier for remote attackers to guess\ngenerated passwords via a brute-force approach.\n\nCVE-2016-2039\nCSRF token values were generated by a non-secure random number\ngenerator, which allows remote attackers to bypass intended access\nrestrictions by predicting a value.\n\nCVE-2016-2040\nMultiple cross-site scripting (XSS) vulnerabilities allow remote\nauthenticated users to inject arbitrary web script or HTML.\n\nCVE-2016-2041\nphpMyAdmin does not use a constant-time algorithm for comparing\nCSRF tokens, which makes it easier for remote attackers to bypass\nintended access restrictions by measuring time differences.\n\nCVE-2016-2560\nMultiple cross-site scripting (XSS) vulnerabilities allow remote\nattackers to inject arbitrary web script or HTML.\n\nCVE-2016-2561\nMultiple cross-site scripting (XSS) vulnerabilities allow remote\nattackers to inject arbitrary web script or HTML.\n\nCVE-2016-5099\nMultiple cross-site scripting (XSS) vulnerabilities allow remote\nattackers to inject arbitrary web script or HTML.\n\nCVE-2016-5701\nFor installations running on plain HTTP, phpMyAdmin allows remote\nattackers to conduct BBCode injection attacks against HTTP sessions\nvia a crafted URI.\n\nCVE-2016-5705\nMultiple cross-site scripting (XSS) vulnerabilities allow remote\nattackers to inject arbitrary web script or HTML.\n\nCVE-2016-5706\nphpMyAdmin allows remote attackers to cause a denial of service\n(resource consumption) via a large array in the scripts parameter.\n\nCVE-2016-5731\nA cross-site scripting (XSS) vulnerability allows remote\nattackers to inject arbitrary web script or HTML.\n\nCVE-2016-5733\nMultiple cross-site scripting (XSS) vulnerabilities allow remote\nattackers to inject arbitrary web script or HTML.\n\nCVE-2016-5739\nA specially crafted Transformation could leak information which\na remote attacker could use to perform cross site request forgeries.\");\n script_tag(name:\"vuldetect\", value:\"This check tests the installed software\nversion using the apt package manager.\");\n\n exit(0);\n}\n\ninclude(\"revisions-lib.inc\");\ninclude(\"pkg-lib-deb.inc\");\n\nres = \"\";\nreport = \"\";\nif((res = isdpkgvuln(pkg:\"phpmyadmin\", ver:\"4:4.2.12-2+deb8u2\", rls:\"DEB8\")) != NULL) {\n report += res;\n}\n\nif(report != \"\") {\n security_message(data:report);\n} else if (__pkg_match) {\n exit(99);\n}", "cvss": {"score": 5.0, "vector": "AV:N/AC:L/Au:N/C:P/I:N/A:N"}}], "archlinux": [{"lastseen": "2016-09-02T18:44:43", "bulletinFamily": "unix", "cvelist": ["CVE-2016-5704", "CVE-2016-5702", "CVE-2016-5701", "CVE-2016-5730", "CVE-2016-5731", "CVE-2016-5705", "CVE-2016-5732", "CVE-2016-5703", "CVE-2016-5733", "CVE-2016-5739", "CVE-2016-5706", "CVE-2016-57033"], "description": "- CVE-2016-5702 (cookie attribute injection)\n\nA vulnerability was found where, under some circumstances, an attacker \ncan inject arbitrary values in the browser cookies.\nOnly affected when PHP_SELF is not set.\n\n- CVE-2016-5703 (SQL injection)\n\nA vulnerability was discovered that allows an SQL injection attack to \nrun arbitrary commands as the control user.\n\nThis attack requires a controluser to exist and be configured in\n`config.inc.php`, therefore the attack can be mitigated by temporarily \ndisabling the controluser.\n\n- CVE-2016-5704 (cross-side scripting)\n\nAn cross-side scripting vulnerability was discovered on the table \nstructure page\n\n- CVE-2016-5705 (cross-side scripting)\n\n * An cross-side scripting vulnerability was discovered on the user \n privileges page.\n * An cross-side scripting vulnerability was discovered in the error\n console.\n * An cross-side scripting vulnerability was discovered in the central\n columns feature.\n * An cross-side scripting vulnerability was discovered in the\n query bookmarks feature.\n * An cross-side scripting vulnerability was discovered in the user \n groups feature.\n\n- CVE-2016-5706 (denial of service)\n\nA Denial Of Service (DOS) attack was discovered in the way phpMyAdmin \nloads some JavaScript files.\n\n- CVE-2016-5730 (information disclosure)\n\nBy specially crafting requests in the following areas, it is possible \nto trigger phpMyAdmin to display a PHP error message which contains the \nfull path of the directory where phpMyAdmin is installed.\n\n1. Setup script 2. Example OpenID authentication script\n\nTo mitigate these issues, it is possible to remove the setup script and \nexamples subdirectories: ./setup/ and ./examples/.\n\n- CVE-2016-5731 (cross-side scripting)\n\nWith a specially crafted request, it is possible to trigger an \ncross-side scripting attack through the example OpenID authentication \nscript.\nOnly affected when the default php.ini is changed and set html_errors = Off.\n\n- CVE-2016-5732 (cross-side scripting)\n\nA vulnerability was reported allowing a specially crafted table \nparameters to cause an cross-side scripting attack through the table \nstructure page.\n\n- CVE-2016-57033 (cross-side scripting)\n\n* A vulnerability was reported allowing a specially crafted table name \n to cause an cross-side scripting attack through the functionality to \n check database privileges.\n* This cross-side scripting doesn't exist in some translations due to \n different quotes being used there (eg. Czech).\n* A vulnerability was reported allowing a specifically-configured\n MySQL server to execute an cross-side scripting attack. This \n particular attack requires configuring the MySQL server log_bin \n directive with the payload.\n* Several cross-side scripting vulnerabilities were found with the \n Transformation feature\n* Several cross-side scripting vulnerabilities were found in AJAX error \n handling\n* Several cross-side scripting vulnerabilities were found in the \n Designer feature\n* An cross-side scripting vulnerability was found in the charts feature\n* An cross-side scripting vulnerability was found in the zoom search \n feature\n\n- CVE-2016-5739 (information disclosure)\n\nA vulnerability was reported where a specially crafted Transformation \ncould be used to leak information including the authentication token.\nThis could be used to direct a CSRF attack against a user.", "modified": "2016-06-25T00:00:00", "published": "2016-06-25T00:00:00", "id": "ASA-201606-25", "href": "https://lists.archlinux.org/pipermail/arch-security/2016-June/000660.html", "type": "archlinux", "title": "phpmyadmin: multiple issues", "cvss": {"score": 7.5, "vector": "AV:NETWORK/AC:LOW/Au:NONE/C:PARTIAL/I:PARTIAL/A:PARTIAL/"}}], "freebsd": [{"lastseen": "2019-05-29T18:32:39", "bulletinFamily": "unix", "cvelist": ["CVE-2016-5704", "CVE-2016-5702", "CVE-2016-5701", "CVE-2016-5730", "CVE-2016-5731", "CVE-2016-5734", "CVE-2016-5705", "CVE-2016-5732", "CVE-2016-5703", "CVE-2016-5733", "CVE-2016-5739", "CVE-2016-5706"], "description": "\nPlease reference CVE/URL list for details\n", "edition": 6, "modified": "2016-06-23T00:00:00", "published": "2016-06-23T00:00:00", "id": "E7028E1D-3F9B-11E6-81F9-6805CA0B3D42", "href": "https://vuxml.freebsd.org/freebsd/e7028e1d-3f9b-11e6-81f9-6805ca0b3d42.html", "title": "phpMyAdmin -- multiple vulnerabilities", "type": "freebsd", "cvss": {"score": 7.5, "vector": "AV:N/AC:L/Au:N/C:P/I:P/A:P"}}], "fedora": [{"lastseen": "2020-12-21T08:17:53", "bulletinFamily": "unix", "cvelist": ["CVE-2016-5701", "CVE-2016-5702", "CVE-2016-5703", "CVE-2016-5705", "CVE-2016-5706", "CVE-2016-5730", "CVE-2016-5731", "CVE-2016-5732", "CVE-2016-5734", "CVE-2016-5739"], "description": "phpMyAdmin is a tool written in PHP intended to handle the administration of MySQL over the World Wide Web. Most frequently used operations are supported by the user interface (managing databases, tables, fields, relations, index es, users, permissions), while you still have the ability to directly execute a ny SQL statement. Features include an intuitive web interface, support for most MySQL features (browse and drop databases, tables, views, fields and indexes, create, copy, drop, rename and alter databases, tables, fields and indexes, maintenance server, databases and tables, with proposals on server configuration, execu te, edit and bookmark any SQL-statement, even batch-queries, manage MySQL users and privileges, manage stored procedures and triggers), import data from CSV and SQL, export data to various formats: CSV, SQL, XML, PDF, OpenDocument T ext and Spreadsheet, Word, Excel, LATEX and others, administering multiple serv ers, creating PDF graphics of your database layout, creating complex queries usi ng Query-by-example (QBE), searching globally in a database or a subset of it, transforming stored data into any format using a set of predefined function s, like displaying BLOB-data as image or download-link and much more... ", "modified": "2016-07-03T10:52:54", "published": "2016-07-03T10:52:54", "id": "FEDORA:602076075485", "href": "", "type": "fedora", "title": "[SECURITY] Fedora 22 Update: phpMyAdmin-4.6.3-1.fc22", "cvss": {"score": 7.5, "vector": "AV:N/AC:L/Au:N/C:P/I:P/A:P"}}, {"lastseen": "2020-12-21T08:17:53", "bulletinFamily": "unix", "cvelist": ["CVE-2016-5701", "CVE-2016-5702", "CVE-2016-5703", "CVE-2016-5705", "CVE-2016-5706", "CVE-2016-5730", "CVE-2016-5731", "CVE-2016-5732", "CVE-2016-5734", "CVE-2016-5739"], "description": "phpMyAdmin is a tool written in PHP intended to handle the administration of MySQL over the World Wide Web. Most frequently used operations are supported by the user interface (managing databases, tables, fields, relations, index es, users, permissions), while you still have the ability to directly execute a ny SQL statement. Features include an intuitive web interface, support for most MySQL features (browse and drop databases, tables, views, fields and indexes, create, copy, drop, rename and alter databases, tables, fields and indexes, maintenance server, databases and tables, with proposals on server configuration, execu te, edit and bookmark any SQL-statement, even batch-queries, manage MySQL users and privileges, manage stored procedures and triggers), import data from CSV and SQL, export data to various formats: CSV, SQL, XML, PDF, OpenDocument T ext and Spreadsheet, Word, Excel, LATEX and others, administering multiple serv ers, creating PDF graphics of your database layout, creating complex queries usi ng Query-by-example (QBE), searching globally in a database or a subset of it, transforming stored data into any format using a set of predefined function s, like displaying BLOB-data as image or download-link and much more... ", "modified": "2016-06-27T18:41:58", "published": "2016-06-27T18:41:58", "id": "FEDORA:07C546075B51", "href": "", "type": "fedora", "title": "[SECURITY] Fedora 24 Update: phpMyAdmin-4.6.3-1.fc24", "cvss": {"score": 7.5, "vector": "AV:N/AC:L/Au:N/C:P/I:P/A:P"}}, {"lastseen": "2020-12-21T08:17:53", "bulletinFamily": "unix", "cvelist": ["CVE-2016-5701", "CVE-2016-5702", "CVE-2016-5703", "CVE-2016-5705", "CVE-2016-5706", "CVE-2016-5730", "CVE-2016-5731", "CVE-2016-5732", "CVE-2016-5734", "CVE-2016-5739"], "description": "phpMyAdmin is a tool written in PHP intended to handle the administration of MySQL over the World Wide Web. Most frequently used operations are supported by the user interface (managing databases, tables, fields, relations, index es, users, permissions), while you still have the ability to directly execute a ny SQL statement. Features include an intuitive web interface, support for most MySQL features (browse and drop databases, tables, views, fields and indexes, create, copy, drop, rename and alter databases, tables, fields and indexes, maintenance server, databases and tables, with proposals on server configuration, execu te, edit and bookmark any SQL-statement, even batch-queries, manage MySQL users and privileges, manage stored procedures and triggers), import data from CSV and SQL, export data to various formats: CSV, SQL, XML, PDF, OpenDocument T ext and Spreadsheet, Word, Excel, LATEX and others, administering multiple serv ers, creating PDF graphics of your database layout, creating complex queries usi ng Query-by-example (QBE), searching globally in a database or a subset of it, transforming stored data into any format using a set of predefined function s, like displaying BLOB-data as image or download-link and much more... ", "modified": "2016-07-03T10:57:02", "published": "2016-07-03T10:57:02", "id": "FEDORA:6380F60652AE", "href": "", "type": "fedora", "title": "[SECURITY] Fedora 23 Update: phpMyAdmin-4.6.3-1.fc23", "cvss": {"score": 7.5, "vector": "AV:N/AC:L/Au:N/C:P/I:P/A:P"}}], "gentoo": [{"lastseen": "2017-01-11T14:15:25", "bulletinFamily": "unix", "cvelist": ["CVE-2016-5098", "CVE-2016-9854", "CVE-2016-6625", "CVE-2016-6615", "CVE-2016-9853", "CVE-2016-5704", "CVE-2016-6614", "CVE-2016-6612", "CVE-2016-9851", "CVE-2016-6617", "CVE-2016-5702", "CVE-2016-6633", "CVE-2016-9848", "CVE-2016-6611", "CVE-2016-6630", "CVE-2016-9863", "CVE-2016-6632", "CVE-2016-5701", "CVE-2016-4412", "CVE-2016-6616", "CVE-2016-9860", "CVE-2016-5730", "CVE-2016-6609", "CVE-2016-9865", "CVE-2016-9852", "CVE-2016-9856", "CVE-2016-9847", "CVE-2016-9858", "CVE-2016-6608", "CVE-2016-5731", "CVE-2016-6622", "CVE-2016-9850", "CVE-2016-6607", "CVE-2016-5097", "CVE-2016-6613", "CVE-2016-5734", "CVE-2016-6606", "CVE-2016-9864", "CVE-2016-5705", "CVE-2016-9859", "CVE-2016-5099", "CVE-2016-5732", "CVE-2016-6626", "CVE-2016-9857", "CVE-2016-5703", "CVE-2016-9855", "CVE-2016-9861", "CVE-2016-6610", "CVE-2016-6619", "CVE-2016-6629", "CVE-2016-6627", "CVE-2016-9849", "CVE-2016-5733", "CVE-2016-6620", "CVE-2016-6623", "CVE-2016-9862", "CVE-2016-5739", "CVE-2016-5706", "CVE-2016-6628", "CVE-2016-6624", "CVE-2016-6631", "CVE-2016-6618", "CVE-2016-9866"], "edition": 1, "description": "### Background\n\nphpMyAdmin is a web-based management tool for MySQL databases.\n\n### Description\n\nMultiple vulnerabilities have been discovered in phpMyAdmin. Please review the CVE identifiers referenced below for details. \n\n### Impact\n\nA authenticated remote attacker could exploit these vulnerabilities to execute arbitrary PHP Code, inject SQL code, or to conduct Cross-Site Scripting attacks. \n\nIn certain configurations, an unauthenticated remote attacker could cause a Denial of Service condition. \n\n### Workaround\n\nThere is no known workaround at this time.\n\n### Resolution\n\nAll phpMyAdmin users should upgrade to the latest version:\n \n \n # emerge --sync\n # emerge --ask --oneshot --verbose \">=dev-db/phpmyadmin-4.6.5.1\"", "modified": "2017-01-11T00:00:00", "published": "2017-01-11T00:00:00", "href": "https://security.gentoo.org/glsa/201701-32", "id": "GLSA-201701-32", "type": "gentoo", "title": "phpMyAdmin: Multiple vulnerabilities", "cvss": {"score": 10.0, "vector": "AV:NETWORK/AC:LOW/Au:NONE/C:COMPLETE/I:COMPLETE/A:COMPLETE/"}}]}