Bugzilla – Bug 1162794
VUL-0: CVE-2019-10784: phpPgAdmin: improper source validation may lead to CSRF
Last modified: 2024-05-19 19:09:27 UTC
CVE-2019-10784 phppgadmin through 7.12.1 allows sensitive actions to be performed without validating that the request originated from the application. One such area, "database.php" does not verify the source of an HTTP request. This can be leveraged by a remote attacker to trick a logged-in administrator to visit a malicious page with a CSRF exploit and execute arbitrary system commands on the server. References: http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2019-10784 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-10784 https://snyk.io/vuln/SNYK-PHP-PHPPGADMINPHPPGADMIN-543885
still no response yet to: https://github.com/phppgadmin/phppgadmin/issues/94 waiting for upstream ...
there is a PR to be merged: https://github.com/phppgadmin/phppgadmin/pull/99 still waiting for upstream ...
created a patch from upstream PR and updated pkg ...
This is an autogenerated message for OBS integration: This bug (1162794) was mentioned in https://build.opensuse.org/request/show/989217 Factory / phpPgAdmin https://build.opensuse.org/request/show/989219 Backports:SLE-15-SP3+Backports:SLE-15-SP4 / phpPgAdmin
openSUSE-SU-2022:10065-1: An update that fixes one vulnerability is now available. Category: security (critical) Bug References: 1162794 CVE References: CVE-2019-10784 JIRA References: Sources used: openSUSE Backports SLE-15-SP4 (src): phpPgAdmin-7.13.0-bp154.2.3.1 openSUSE Backports SLE-15-SP3 (src): phpPgAdmin-7.13.0-bp153.2.6.1
I think we can close this, can't we ?
change state to resolved/fixed
should not have closed it. assign back to security
done