Bug 27912

Summary: phppgadmin new security issue CVE-2019-10784
Product: Mageia Reporter: Zombie Ryushu <zombie_ryushu>
Component: SecurityAssignee: QA Team <qa-bugs>
Status: RESOLVED FIXED QA Contact: Sec team <security>
Severity: normal    
Priority: Normal CC: andrewsfarm, mageia, ouaurelien, sysadmin-bugs
Version: 7Keywords: advisory, validated_update
Target Milestone: ---   
Hardware: All   
OS: Linux   
URL: https://nvd.nist.gov/vuln/detail/CVE-2019-10784
Whiteboard: MGA7-64-OK
Source RPM: phppgadmin-7.12.0-1.mga7.src.rpm CVE: CVE-2019-10784
Status comment:

Description Zombie Ryushu 2020-12-23 12:25:58 CET
phppgadmin through 7.12.1 allows sensitive actions to be performed without validating that the request originated from the application. One such area, "database.php" does not verify the source of an HTTP request. This can be leveraged by a remote attacker to trick a logged-in administrator to visit a malicious page with a CSRF exploit and execute arbitrary system commands on the server.
Zombie Ryushu 2020-12-23 12:26:09 CET

CVE: (none) => CVE-2019-10784

Comment 1 David Walser 2020-12-23 17:55:15 CET
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-10784

Fixed upstream in 7.13.0.

Source RPM: phppgadmin-7.12.0-1.mga7.src => phppgadmin-7.12.0-1.mga7.src.rpm
Assignee: bugsquad => mageia
Summary: phppgadmin security issue CVE-2019-10784 => phppgadmin new security issue CVE-2019-10784

Comment 2 Nicolas Lécureuil 2020-12-24 00:12:21 CET
new version uploaded in updates_testing:
src: phppgadmin-7.13.0-1.mga7

Assignee: mageia => qa-bugs
CC: (none) => mageia

Comment 3 David Walser 2020-12-24 00:43:08 CET
Advisory:
========================

Updated phppgadmin package fixes security vulnerability:

phppgadmin through 7.12.1 allows sensitive actions to be performed without
validating that the request originated from the application. One such area,
database.php does not verify the source of an HTTP request. This can be
leveraged by a remote attacker to trick a logged-in administrator to visit a
malicious page with a CSRF exploit and execute arbitrary system commands on the
server (CVE-2019-10784).

References:
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-10784
========================

Updated packages in core/updates_testing:
========================
phppgadmin-7.13.0-1.mga7

from phppgadmin-7.13.0-1.mga7.src.rpm
Comment 4 Thomas Andrews 2021-02-07 17:43:09 CET
I sent the last one (Bug 25774) through with a clean install, so that should be good enough this time, too.

Validating. Advisory in comment 3.

Whiteboard: (none) => MGA7-64-OK
CC: (none) => andrewsfarm, sysadmin-bugs
Keywords: (none) => validated_update

Comment 5 Aurelien Oudelet 2021-02-08 15:21:15 CET
Advisory pushed to SVN.

CC: (none) => ouaurelien
Keywords: (none) => advisory

Comment 6 Mageia Robot 2021-02-08 18:59:31 CET
An update for this issue has been pushed to the Mageia Updates repository.

https://advisories.mageia.org/MGASA-2021-0074.html

Resolution: (none) => FIXED
Status: NEW => RESOLVED