Bug 27912 - phppgadmin new security issue CVE-2019-10784
Summary: phppgadmin new security issue CVE-2019-10784
Status: RESOLVED FIXED
Alias: None
Product: Mageia
Classification: Unclassified
Component: Security (show other bugs)
Version: 7
Hardware: All Linux
Priority: Normal normal
Target Milestone: ---
Assignee: QA Team
QA Contact: Sec team
URL: https://nvd.nist.gov/vuln/detail/CVE-...
Whiteboard: MGA7-64-OK
Keywords: advisory, validated_update
Depends on:
Blocks:
 
Reported: 2020-12-23 12:25 CET by Zombie Ryushu
Modified: 2021-02-08 18:59 CET (History)
4 users (show)

See Also:
Source RPM: phppgadmin-7.12.0-1.mga7.src.rpm
CVE: CVE-2019-10784
Status comment:


Attachments

Description Zombie Ryushu 2020-12-23 12:25:58 CET
phppgadmin through 7.12.1 allows sensitive actions to be performed without validating that the request originated from the application. One such area, "database.php" does not verify the source of an HTTP request. This can be leveraged by a remote attacker to trick a logged-in administrator to visit a malicious page with a CSRF exploit and execute arbitrary system commands on the server.
Zombie Ryushu 2020-12-23 12:26:09 CET

CVE: (none) => CVE-2019-10784

Comment 1 David Walser 2020-12-23 17:55:15 CET
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-10784

Fixed upstream in 7.13.0.

Source RPM: phppgadmin-7.12.0-1.mga7.src => phppgadmin-7.12.0-1.mga7.src.rpm
Assignee: bugsquad => mageia
Summary: phppgadmin security issue CVE-2019-10784 => phppgadmin new security issue CVE-2019-10784

Comment 2 Nicolas Lécureuil 2020-12-24 00:12:21 CET
new version uploaded in updates_testing:
src: phppgadmin-7.13.0-1.mga7

Assignee: mageia => qa-bugs
CC: (none) => mageia

Comment 3 David Walser 2020-12-24 00:43:08 CET
Advisory:
========================

Updated phppgadmin package fixes security vulnerability:

phppgadmin through 7.12.1 allows sensitive actions to be performed without
validating that the request originated from the application. One such area,
database.php does not verify the source of an HTTP request. This can be
leveraged by a remote attacker to trick a logged-in administrator to visit a
malicious page with a CSRF exploit and execute arbitrary system commands on the
server (CVE-2019-10784).

References:
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-10784
========================

Updated packages in core/updates_testing:
========================
phppgadmin-7.13.0-1.mga7

from phppgadmin-7.13.0-1.mga7.src.rpm
Comment 4 Thomas Andrews 2021-02-07 17:43:09 CET
I sent the last one (Bug 25774) through with a clean install, so that should be good enough this time, too.

Validating. Advisory in comment 3.

Whiteboard: (none) => MGA7-64-OK
CC: (none) => andrewsfarm, sysadmin-bugs
Keywords: (none) => validated_update

Comment 5 Aurelien Oudelet 2021-02-08 15:21:15 CET
Advisory pushed to SVN.

CC: (none) => ouaurelien
Keywords: (none) => advisory

Comment 6 Mageia Robot 2021-02-08 18:59:31 CET
An update for this issue has been pushed to the Mageia Updates repository.

https://advisories.mageia.org/MGASA-2021-0074.html

Resolution: (none) => FIXED
Status: NEW => RESOLVED


Note You need to log in before you can comment on or make changes to this bug.