Name | CVE-2008-1149 |
Description | phpMyAdmin before 2.11.5 accesses $_REQUEST to obtain some parameters instead of $_GET and $_POST, which allows attackers in the same domain to override certain variables and conduct SQL injection and Cross-Site Request Forgery (CSRF) attacks by using crafted cookies. |
Source | CVE (at NVD; CERT, LWN, oss-sec, fulldisc, Red Hat, Ubuntu, Gentoo, SUSE bugzilla/CVE, GitHub advisories/code/issues, web search, more) |
References | DSA-1557-1 |
Vulnerable and fixed packages
The table below lists information on source packages.
Source Package | Release | Version | Status |
---|
phpmyadmin (PTS) | jessie, jessie (lts) | 4:4.2.12-2+deb8u12 | fixed |
| stretch (security) | 4:4.6.6-4+deb9u2 | fixed |
| stretch (lts), stretch | 4:4.6.6-4+deb9u3 | fixed |
| bullseye | 4:5.0.4+dfsg2-2+deb11u1 | fixed |
| bookworm | 4:5.2.1+dfsg-1 | fixed |
| sid, trixie | 4:5.2.1+dfsg-4 | fixed |
The information below is based on the following data on fixed versions.
Notes
[etch] - phpmyadmin <no-dsa> (Minor issue)
[sarge] - phpmyadmin <not-affected> (Vulnerable code not present)
https://www.phpmyadmin.net/security/PMASA-2008-1/
https://github.com/phpmyadmin/phpmyadmin/commit/c57b39bed91f06d574a95d8a5a091e5e59492d69
SQL injection if you can set local cookies, which means
you must be able to create pages in the same cookie domain, which seems
rare and unwise. low priority.