Announcement-ID: PMASA-2015-1
Date: 2015-03-04
Risk of BREACH attack due to reflected parameter.
With a large number of crafted requests it was possible to infer the CSRF token by a BREACH attack.
We consider this vulnerability to be non critical.
This vulnerability can only be exploited in the presence of another vulnerability that allows the attacker to inject JavaScript into victim's browser.
Versions 4.0.x (prior to 4.0.10.9), 4.2.x (prior to 4.2.13.2) and 4.3.x (prior to 4.3.11.1) are affected.
Upgrade to phpMyAdmin 4.0.10.9 or newer, or 4.2.13.2 or newer, or 4.3.11.1 or newer, or apply the patch listed below.
Thanks to Jian Jiang (https://www.linkedin.com/pub/jian-jiang/3a/660/775) and Xiaofeng Zheng (iliwoy@gmail.com) for reporting this vulnerability.
Assigned CVE ids: CVE-2015-2206
The following commits have been made to fix this issue:
The following commits have been made on the 4.2 branch to fix this issue:
The following commits have been made on the 4.0 branch to fix this issue:
For further information and in case of questions, please contact the phpMyAdmin team. Our website is phpmyadmin.net.