Exploit/Advisories Cybersecurity study of the dark web exposes vulnerability to machine identities -- ScienceDaily

Published on September 16th, 2019 📆 | 5208 Views ⚑

0

phpMyAdmin 4.9.0.1 Setup Page cross site request forgery


https://www.ispeech.org

CVSS Meta Temp Score Current Exploit Price (β‰ˆ)
5.7 $0-$5k

A vulnerability classified as problematic was found in phpMyAdmin 4.9.0.1 (Database Administration Software). Affected by this vulnerability is an unknown code block of the component Setup Page. The manipulation with an unknown input leads to a cross site request forgery vulnerability. The CWE definition for the vulnerability is CWE-352. As an impact it is known to affect integrity, and availability. An attacker might be able force legitimate users to initiate unwanted actions within the web application.

The weakness was shared 09/13/2019 as EDB-ID 47385 as uncorroborated exploit (Exploit-DB). The advisory is shared at exploit-db.com. This vulnerability is known as CVE-2019-12922 since 06/20/2019. The attack can be launched remotely. The exploitation doesn't need any form of authentication. Technical details are unknown but a public exploit is available.

After immediately, there has been an exploit disclosed. It is declared as proof-of-concept. It is possible to download the exploit at exploit-db.com.

There is no information about possible countermeasures known. It may be suggested to replace the affected object with an alternative product.

Type

Name

VulDB Meta Base Score: 5.9
VulDB Meta Temp Score: 5.7

VulDB Base Score: 5.4
VulDB Temp Score: 5.2
VulDB Vector: πŸ”’
VulDB Reliability: πŸ”

NVD Base Score: 6.5
NVD Vector: πŸ”’

AV AC Au C I A
πŸ” πŸ” πŸ” πŸ” πŸ” πŸ”
πŸ” πŸ” πŸ” πŸ” πŸ” πŸ”
πŸ” πŸ” πŸ” πŸ” πŸ” πŸ”
Vector Complexity Authentication Confidentiality Integrity Availability
unlock unlock unlock unlock unlock unlock
unlock unlock unlock unlock unlock unlock
unlock unlock unlock unlock unlock unlock


VulDB Base Score: πŸ”’
VulDB Temp Score: πŸ”’
VulDB Reliability: πŸ”

NVD Base Score: πŸ”’

Class: Cross site request forgery (CWE-352)
Local: No
Remote: Yes





Availability: πŸ”’
Access: Public
Status: Proof-of-Concept
Download: πŸ”’

Price Prediction: πŸ”
Current Price Estimation: πŸ”’


0-Day unlock unlock unlock unlock
Today unlock unlock unlock unlock


Exploit-DB: πŸ”’

Threat Intelligenceinfoedit

Threat: πŸ”
Adversaries: πŸ”
Geopolitics: πŸ”
Economy: πŸ”
Predictions: πŸ”
Remediation: πŸ”Recommended: no mitigation known

0-Day Time: πŸ”’
Exploit Delay Time: πŸ”

06/20/2019 CVE assigned
09/13/2019 +85 days Advisory disclosed
09/13/2019 +0 days Exploit disclosed
09/13/2019 +0 days EDB entry disclosed
09/14/2019 +1 days VulDB entry created
09/14/2019 +0 days VulDB last updateProduct: phpmyadmin.net

Advisory: EDB-ID 47385
Status: Uncorroborated

CVE: CVE-2019-12922 (πŸ”’)

Created: 09/14/2019 05:49 PM
Complete: πŸ”

Comments

No comments yet. Please log in to comment.

See the underground prices here!

https://vuldb.com/?id.141769

Tagged with: β€’ β€’ β€’ β€’



Comments are closed.