Miggo Logo

CVE-2017-1000016: phpMyAdmin Cookie attribute injection attack

7.5

CVSS Score
3.0

Basic Information

EPSS Score
0.72368%
Published
5/17/2022
Updated
4/24/2024
KEV Status
No
Technology
TechnologyPHP

Technical Details

CVSS Vector
CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N
Package NameEcosystemVulnerable VersionsFirst Patched Version
phpmyadmin/phpmyadmincomposer>= 4.6, < 4.6.64.6.6

Vulnerability Intelligence
Miggo AIMiggo AI

Miggo AIRoot Cause Analysis

The vulnerability stems from improper input validation in path handling. The commit 3b6ed1f modifies PMA_cleanupPathInfo to add query string handling and path normalization, addressing an incomplete fix from PMASA-2016-18. The original implementation failed to properly sanitize PHP_SELF by not stripping query parameters before processing PATH_INFO and not resolving '..'/. path components, enabling attackers to inject cookie attributes via manipulated URLs. The CWE-20 classification and patch context confirm input validation flaws in this function.

Vulnerable functions

Only Mi**o us*rs **n s** t*is s**tion

WAF Protection Rules

WAF Rule

* w**kn*ss w*s *is*ov*r** w**r* *n *tt**k*r **n inj**t *r*itr*ry v*lu*s in to t** *rows*r *ooki*s. T*is is * r*-issu* o* *n in*ompl*t* *ix *rom PM*S*-****-**.

Reasoning

T** vuln*r**ility st*ms *rom improp*r input v*li**tion in p*t* **n*lin*. T** *ommit ******* mo*i*i*s PM*_*l**nupP*t*In*o to *** qu*ry strin* **n*lin* *n* p*t* norm*liz*tion, ***r*ssin* *n in*ompl*t* *ix *rom PM*S*-****-**. T** ori*in*l impl*m*nt*tion