CVE-2016-9861: phpMyAdmin Bypass white-list protection for URL redirection
7.5
CVSS Score
3.0
Basic Information
CVE ID
GHSA ID
EPSS Score
0.50952%
CWE
-
Published
5/17/2022
Updated
4/24/2024
KEV Status
No
Technology
PHP
Technical Details
CVSS Vector
CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N
Package Name | Ecosystem | Vulnerable Versions | First Patched Version |
---|---|---|---|
phpmyadmin/phpmyadmin | composer | >= 4.6, < 4.6.5 | 4.6.5 |
phpmyadmin/phpmyadmin | composer | >= 4.4, < 4.4.15.9 | 4.4.15.9 |
phpmyadmin/phpmyadmin | composer | >= 4.0, < 4.0.10.18 | 4.0.10.18 |
Vulnerability Intelligence
Miggo AI
Root Cause Analysis
The vulnerability centers around improper URL whitelist validation for redirects. The Core::checkPageValidity
function is phpMyAdmin's known URL validation mechanism, and the provided commit hashes (af7c589/499a61c/dac36c3) from the phpMyAdmin advisory indicate fixes to this validation logic. Historical analysis shows this function previously used a vulnerable 'trustedPrefix' check that could be bypassed by appending '/' or encoded characters to whitelisted paths. The function's role in URL validation and the nature of the bypass (incomplete pattern matching) directly align with the described vulnerability.