CVE-2019-10784

NameCVE-2019-10784
Descriptionphppgadmin through 7.12.1 allows sensitive actions to be performed without validating that the request originated from the application. One such area, "database.php" does not verify the source of an HTTP request. This can be leveraged by a remote attacker to trick a logged-in administrator to visit a malicious page with a CSRF exploit and execute arbitrary system commands on the server.
SourceCVE (at NVD; CERT, LWN, oss-sec, fulldisc, bugtraq, EDB, Metasploit, Red Hat, Ubuntu, Gentoo, SUSE bugzilla/CVE, Mageia, GitHub code/issues, web search, more)
NVD severityhigh
Debian Bugs953945

Vulnerable and fixed packages

The table below lists information on source packages.

Source PackageReleaseVersionStatus
phppgadmin (PTS)jessie5.1-1.1vulnerable
stretch5.1+ds-2vulnerable
buster5.1+ds-4vulnerable
bullseye, sid7.12.1+dfsg-1vulnerable

The information below is based on the following data on fixed versions.

PackageTypeReleaseFixed VersionUrgencyOriginDebian Bugs
phppgadminsource(unstable)(unfixed)953945

Notes

[buster] - phppgadmin <no-dsa> (Minor issue)
[stretch] - phppgadmin <no-dsa> (Minor issue)
[jessie] - phppgadmin <no-dsa> (Minor issue)
https://snyk.io/vuln/SNYK-PHP-PHPPGADMINPHPPGADMIN-543885
https://github.com/phppgadmin/phppgadmin/issues/94

Search for package or bug name: Reporting problems