Date: Fri, 14 Jun 2019 06:48:52 +0000 (UTC) From: Matthew Seaman <matthew@FreeBSD.org> To: ports-committers@freebsd.org, svn-ports-all@freebsd.org, svn-ports-head@freebsd.org Subject: svn commit: r504157 - head/security/vuxml Message-ID: <201906140648.x5E6mqd6064934@repo.freebsd.org>
next in thread | raw e-mail | index | archive | help
Author: matthew Date: Fri Jun 14 06:48:51 2019 New Revision: 504157 URL: https://svnweb.freebsd.org/changeset/ports/504157 Log: Document PMASA-2019-4; CSRF vulnerability in login form Modified: head/security/vuxml/vuln.xml Modified: head/security/vuxml/vuln.xml ============================================================================== --- head/security/vuxml/vuln.xml Fri Jun 14 05:59:57 2019 (r504156) +++ head/security/vuxml/vuln.xml Fri Jun 14 06:48:51 2019 (r504157) @@ -58,6 +58,55 @@ Notes: * Do not forget port variants (linux-f10-libxml2, libxml2, etc.) --> <vuxml xmlns="http://www.vuxml.org/apps/vuxml-1"> + <vuln vid="a5681027-8e03-11e9-85f4-6805ca0b3d42"> + <topic>phpMyAdmin -- CSRF vulnerability in login form</topic> + <affects> + <package> + <name>phpMyAdmin</name> + <name>phpMyAdmin-php56</name> + <name>phpMyAdmin-php70</name> + <name>phpMyAdmin-php71</name> + <name>phpMyAdmin-php72</name> + <range><lt>4.9.0</lt></range> + </package> + </affects> + <description> + <body xmlns="http://www.w3.org/1999/xhtml"> + <p>The phpMyAdmin development team reports:</p> + <blockquote cite="https://www.phpmyadmin.net/security/PMASA-2019-4/"> + <h3>Summary</h3> + <p>CSRF vulnerability in login form</p> + + <h3>Description</h3> + <p>A vulnerability was found that allows an attacker to + trigger a CSRF attack against a phpMyAdmin user. The + attacker can trick the user, for instance through a broken + <code><img></code> tag pointing at the victim's + phpMyAdmin database, and the attacker can potentially + deliver a payload (such as a specific INSERT or DELETE + statement) through the victim.</p> + + <h3>Severity</h3> + <p>We consider this vulnerability to be severe.</p> + + + <h3>Mitigation factor</h3> <p>Only the 'cookie' + auth_type is affected; users can temporary use + phpMyAdmin's http authentication as a workaround.</p> + + </blockquote> + </body> + </description> + <references> + <url>https://www.phpmyadmin.net/security/PMASA-2019-4/</url> + <cvename>CVE-2019-12616</cvename> + </references> + <dates> + <discovery>2019-06-04</discovery> + <entry>2019-06-13</entry> + </dates> + </vuln> + <vuln vid="bbdb9713-8e09-11e9-87bc-002590acae31"> <topic>Vim/NeoVim -- Security vulnerability</topic> <affects>
Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?201906140648.x5E6mqd6064934>