Cross-site Request Forgery (CSRF) Affecting phppgadmin/phppgadmin package, versions >=0.0.0


Severity

Recommended
0.0
medium
0
10

CVSS assessment made by Snyk's Security Team. Learn more

Threat Intelligence

Exploit Maturity
Proof of concept
EPSS
1.2% (85th percentile)

Do your applications use this vulnerable package?

In a few clicks we can analyze your entire application and see what components are vulnerable in your application, and suggest you quick fixes.

Test your applications

Snyk Learn

Learn about Cross-site Request Forgery (CSRF) vulnerabilities in an interactive lesson.

Start learning
  • Snyk IDSNYK-PHP-PHPPGADMINPHPPGADMIN-543885
  • published1 Feb 2020
  • disclosed1 Feb 2020
  • creditSam Sanoop of Snyk Security Team

Introduced: 1 Feb 2020

CVE-2019-10784  (opens in a new tab)
CWE-352  (opens in a new tab)
First added by Snyk

How to fix?

There is no fixed version for phppgadmin/phppgadmin.

Overview

phppgadmin/phppgadmin is a web-based administration tool for PostgreSQL. It is perfect for PostgreSQL DBAs, newbies, and hosting services.

Affected versions of this package are vulnerable to Cross-site Request Forgery (CSRF). Multiple areas within the application allows sensitive actions to be performed without validating that the request originated from the application. One such area, database.php ​ does not verify the source of an HTTP request. This can be leveraged by a remote attacker to trick a logged-in administrator to visit a malicious page with a CSRF exploit and execute arbitrary system commands on the server.

References

CVSS Scores

version 3.1