First published: Sat Feb 20 2016(Updated: )
libraries/sql-parser/autoload.php in the SQL parser in phpMyAdmin 4.5.x before 4.5.4 allows remote attackers to obtain sensitive information via a crafted request, which reveals the full path in an error message.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Fedoraproject Fedora | =22 | |
Fedoraproject Fedora | =23 | |
phpMyAdmin phpMyAdmin | =4.5.0 | |
phpMyAdmin phpMyAdmin | =4.5.0.1 | |
phpMyAdmin phpMyAdmin | =4.5.0.2 | |
phpMyAdmin phpMyAdmin | =4.5.1 | |
phpMyAdmin phpMyAdmin | =4.5.2 | |
phpMyAdmin phpMyAdmin | =4.5.3 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2016-2044 is considered a medium severity vulnerability as it can lead to the exposure of sensitive information.
To fix CVE-2016-2044, upgrade phpMyAdmin to version 4.5.4 or later.
CVE-2016-2044 affects phpMyAdmin versions 4.5.0 to 4.5.3 and Fedora versions 22 and 23.
The impact of CVE-2016-2044 is that it allows remote attackers to obtain sensitive information, such as the full server path.
Yes, CVE-2016-2044 can be exploited remotely by sending a crafted request to the vulnerable phpMyAdmin installation.