CVE-2012-1902
Published Apr 6, 2012
Last updated 7 years ago
Overview
- Description
- show_config_errors.php in phpMyAdmin 3.4.x before 3.4.10.2, when a configuration file does not exist, allows remote attackers to obtain sensitive information via a direct request, which reveals the installation path in an error message about this missing file.
- Source
- cve@mitre.org
- NVD status
- Modified
Social media
- Hype score
- Not currently trending
Risk scores
CVSS 2.0
- Type
- Primary
- Base score
- 4.3
- Impact score
- 2.9
- Exploitability score
- 8.6
- Vector string
- AV:N/AC:M/Au:N/C:P/I:N/A:N
Weaknesses
- nvd@nist.gov
- CWE-200
Configurations
[ { "nodes": [ { "negate": false, "cpeMatch": [ { "criteria": "cpe:2.3:a:phpmyadmin:phpmyadmin:3.4.0.0:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "2C714361-7AE3-4DC2-994C-7C67B41226B0" }, { "criteria": "cpe:2.3:a:phpmyadmin:phpmyadmin:3.4.1.0:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "2A3CED16-3ECE-49F6-A52B-0222B14DBC88" }, { "criteria": "cpe:2.3:a:phpmyadmin:phpmyadmin:3.4.2.0:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "E4938BCE-1365-469A-B714-A5D9C451FA20" }, { "criteria": "cpe:2.3:a:phpmyadmin:phpmyadmin:3.4.3.0:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "35F46942-E054-43E4-9543-E126738845E2" }, { "criteria": "cpe:2.3:a:phpmyadmin:phpmyadmin:3.4.3.1:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "A1A24EBE-D760-4251-972E-86B71EC8A07D" }, { "criteria": "cpe:2.3:a:phpmyadmin:phpmyadmin:3.4.3.2:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "9AC8F001-B2D6-49AD-94E7-673E8BEC958C" }, { "criteria": "cpe:2.3:a:phpmyadmin:phpmyadmin:3.4.4.0:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "AE9EFA08-1838-46A9-A851-A0540C60739D" }, { "criteria": "cpe:2.3:a:phpmyadmin:phpmyadmin:3.4.5.0:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "B231B0D4-F971-4D4F-97CE-74951DF2B681" }, { "criteria": "cpe:2.3:a:phpmyadmin:phpmyadmin:3.4.6.0:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "FF6604AE-12E8-43F8-9170-557009F34928" }, { "criteria": "cpe:2.3:a:phpmyadmin:phpmyadmin:3.4.7.0:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "CD67845D-C1AD-46EF-A2EF-6C979E3363BF" }, { "criteria": "cpe:2.3:a:phpmyadmin:phpmyadmin:3.4.7.1:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "8C36E012-A028-4A47-9EAB-553D18F5E053" }, { "criteria": "cpe:2.3:a:phpmyadmin:phpmyadmin:3.4.8.0:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "6044293D-28C5-4B35-B046-E8984A2AA029" }, { "criteria": "cpe:2.3:a:phpmyadmin:phpmyadmin:3.4.9.0:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "C774C482-4EE2-47DE-BCC4-35020E02A9AD" }, { "criteria": "cpe:2.3:a:phpmyadmin:phpmyadmin:3.4.10.0:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "10F44BD9-A868-420B-9B9F-9CC4809A9C49" }, { "criteria": "cpe:2.3:a:phpmyadmin:phpmyadmin:3.4.10.1:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "706127A4-C6E2-4A6C-81EC-3B890E677273" } ], "operator": "OR" } ] } ]