PMASA-2016-14

Announcement-ID: PMASA-2016-14

Date: 2016-05-25

Updated: 2016-05-30

Summary

Sensitive Data in URL GET Query Parameters

Description

Because user SQL queries are part of the URL, sensitive information made as part of a user query can be exposed by clicking on external links to attackers monitoring user GET query parameters or included in the webserver logs.

Updated to include CVE ID and added commits fixing most of problems in 4.0.10 branch.

Severity

We consider this to be non-critical.

Mitigation factor

Avoid clicking on external links in phpMyAdmin which are not redirected through url.php script.

Affected Versions

All versions prior 4.6.2 are affected.

Solution

Upgrade to phpMyAdmin 4.6.2 or newer or apply patches listed below.

References

This issue was found thanks to Mozilla SOS program.

Assigned CVE ids: CVE-2016-5097

CWE ids: CWE-661

Patches

The following commits have been made on the 4.6 branch to fix this issue:

The following commits have been made on the 4.0 branch to fix this issue:

More information

For further information and in case of questions, please contact the phpMyAdmin team. Our website is phpmyadmin.net.

Announcements