Anfälligkeitssuche        Suche in 324607 CVE Beschreibungen
und 145615 Test Beschreibungen,
Zugriff auf 10,000+ Quellverweise.
Tests   CVE   Alle  

Test Kennung:1.3.6.1.4.1.25623.1.1.10.2022.0036
Kategorie:Mageia Linux Local Security Checks
Titel:Mageia: Security Advisory (MGASA-2022-0036)
Zusammenfassung:The remote host is missing an update for the 'phpmyadmin' package(s) announced via the MGASA-2022-0036 advisory.
Beschreibung:Summary:
The remote host is missing an update for the 'phpmyadmin' package(s) announced via the MGASA-2022-0036 advisory.

Vulnerability Insight:
A flaw was identified in how phpMyAdmin processes two factor
authentication, a user could potentially manipulate their account to
bypass two factor authentication in subsequent authentication sessions
(PMASA-2022-1).

A series of weaknesses was identified allowing a malicious user to submit
malicious information to present an XSS or HTML injection attack in the
graphical setup page (PMASA-2022-2).

In some scenarios, potentially sensitive information such as a the
database name can be part of the URL. This can now be optionally
encrypted.

During a failed log on attempt, the error message reveals the target
database server's hostname or IP address. This can reveal some
information about the network infrastructure to an attacker.

Fixed some situations where a user is logged out when working with more
than one server

Fixed a problem with assigning privileges to a user using the multiselect
list when the database name has an underscore

Enable cookie parameter 'SameSite' when the PHP version is 7.3 or newer.

Affected Software/OS:
'phpmyadmin' package(s) on Mageia 8.

Solution:
Please install the updated package(s).

CVSS Score:
4.3

CVSS Vector:
AV:N/AC:M/Au:N/C:N/I:P/A:N

Querverweis: Common Vulnerability Exposure (CVE) ID: CVE-2022-23807
https://security.gentoo.org/glsa/202311-17
https://www.phpmyadmin.net/security/PMASA-2022-1/
Common Vulnerability Exposure (CVE) ID: CVE-2022-23808
https://infosecwriteups.com/exploit-cve-2022-23808-85041c6e5b97
https://www.phpmyadmin.net/security/PMASA-2022-2/
CopyrightCopyright (C) 2022 Greenbone AG

Dies ist nur einer von 145615 Anfälligkeitstests in unserem Testpaket. Finden Sie mehr über unsere vollständigen Sicherheitsüberprüfungen heraus.

Um einen gratis Test für diese Anfälligkeit auf Ihrem System durchlaufen zu lassen, registrieren Sie sich bitte unten.




© 1998-2025 E-Soft Inc. Alle Rechte vorbehalten.