CVE-2012-5469
Published Dec 20, 2012
Last updated 12 years ago
Overview
- Description
- The Portable phpMyAdmin plugin before 1.3.1 for WordPress allows remote attackers to bypass authentication and obtain phpMyAdmin console access via a direct request to wp-content/plugins/portable-phpmyadmin/wp-pma-mod.
- Source
- cve@mitre.org
- NVD status
- Analyzed
Risk scores
CVSS 2.0
- Type
- Primary
- Base score
- 7.5
- Impact score
- 6.4
- Exploitability score
- 10
- Vector string
- AV:N/AC:L/Au:N/C:P/I:P/A:P
Weaknesses
- nvd@nist.gov
- CWE-264
Social media
- Hype score
- Not currently trending
Configurations
[ { "nodes": [ { "negate": false, "cpeMatch": [ { "criteria": "cpe:2.3:a:phpmyadmin:phpmyadmin:1.0.0:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "36DE9269-E61E-4F24-AC1A-978503933E37" }, { "criteria": "cpe:2.3:a:phpmyadmin:phpmyadmin:1.0.1:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "2E1A8297-4418-4DBF-8C53-B5667103DC91" }, { "criteria": "cpe:2.3:a:phpmyadmin:phpmyadmin:1.0.2:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "AF0D75EB-BEA7-4B0A-8CDD-9207350D0D91" }, { "criteria": "cpe:2.3:a:phpmyadmin:phpmyadmin:1.0.3:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "C1CCD716-02E7-4017-98C0-0441D459CAFD" }, { "criteria": "cpe:2.3:a:phpmyadmin:phpmyadmin:1.0.4:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "4C7B2C59-9084-4456-A2BD-8827562F93EA" }, { "criteria": "cpe:2.3:a:phpmyadmin:phpmyadmin:1.0.5:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "1911AB52-EEA2-45A6-BF52-304B4FF763B3" }, { "criteria": "cpe:2.3:a:phpmyadmin:phpmyadmin:1.0.6:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "86F0CCD7-22AB-474F-BFFC-B4AEAD5C02DD" }, { "criteria": "cpe:2.3:a:phpmyadmin:phpmyadmin:1.0.6:a:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "2412915B-6D01-40D9-AA9B-E09FC1B86E38" }, { "criteria": "cpe:2.3:a:phpmyadmin:phpmyadmin:1.0.7:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "2D194DB9-CEA9-4571-A5BD-6900C97AA0B9" }, { "criteria": "cpe:2.3:a:phpmyadmin:phpmyadmin:1.0.8:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "D3038292-307C-4FCC-87F7-19FDB183D51E" }, { "criteria": "cpe:2.3:a:phpmyadmin:phpmyadmin:1.1:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "D2FF9BE0-FEA4-47DA-8558-8959B5612EA5" }, { "criteria": "cpe:2.3:a:phpmyadmin:phpmyadmin:1.2:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "9169B9B4-5E04-45B1-A600-B97B5224D24B" }, { "criteria": "cpe:2.3:a:phpmyadmin:phpmyadmin:1.2.1:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "8A5E40DD-F6A3-4D97-8770-4F3776F5CBE7" }, { "criteria": "cpe:2.3:a:phpmyadmin:phpmyadmin:1.2.2:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "4F6673A9-D214-474B-BC3E-C13ACB3B5204" }, { "criteria": "cpe:2.3:a:phpmyadmin:phpmyadmin:1.2.3:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "15E8363E-3B8A-4248-AFEA-39DE1098712E" }, { "criteria": "cpe:2.3:a:phpmyadmin:phpmyadmin:1.2.4:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "91256645-2A40-4242-B938-234D72C05E20" }, { "criteria": "cpe:2.3:a:phpmyadmin:phpmyadmin:1.2.5:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "1BA4F6BA-5678-4D7C-A98F-141079C18523" }, { "criteria": "cpe:2.3:a:phpmyadmin:phpmyadmin:1.2.6:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "D06E973A-1C66-43FF-BC61-2FC7DDAFFF57" }, { "criteria": "cpe:2.3:a:phpmyadmin:phpmyadmin:1.2.7:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "169037D5-AEA0-4950-B0BF-EBC9A08AA2DD" }, { "criteria": "cpe:2.3:a:phpmyadmin:phpmyadmin:1.2.8:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "C9C7CE08-AED8-4D8C-A73F-A69404BAE8DA" }, { "criteria": "cpe:2.3:a:phpmyadmin:phpmyadmin:1.2.9:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "9A675524-9339-4E5C-9763-2E7EEA6FBCC7" }, { "criteria": "cpe:2.3:a:phpmyadmin:phpmyadmin:1.2.9.1:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "42ACF3CF-2BFB-4BA4-9DC1-2B56B847AAF5" }, { "criteria": "cpe:2.3:a:phpmyadmin:phpmyadmin:1.2.9.2:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "F81BFCAE-708F-4C0D-8899-DB3E6F08820B" }, { "criteria": "cpe:2.3:a:phpmyadmin:phpmyadmin:1.2.9.3:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "0C7C7E0F-9BF4-4719-97C3-4F395EDCAC60" }, { "criteria": "cpe:2.3:a:phpmyadmin:phpmyadmin:1.2.9.4:b:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "AA9D7C76-A7B7-4852-BC34-48C010CA2652" }, { "criteria": "cpe:2.3:a:phpmyadmin:phpmyadmin:1.2.9.4:c:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "CF931388-E9C8-47D7-8A8F-8036B082164E" }, { "criteria": "cpe:2.3:a:phpmyadmin:phpmyadmin:1.2.9.5:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "460F6547-8606-41BA-BCCD-EB38739EB22A" }, { "criteria": "cpe:2.3:a:phpmyadmin:phpmyadmin:1.3:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "BAF4BE01-9BD6-492C-85E7-BD3CF08F5EA6" }, { "criteria": "cpe:2.3:a:phpmyadmin:phpmyadmin:1.3:alpha:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "E9C4C7B1-DD4C-4D58-B36E-786797017625" } ], "operator": "OR" }, { "negate": false, "cpeMatch": [ { "criteria": "cpe:2.3:a:wordpress:wordpress:-:*:*:*:*:*:*:*", "vulnerable": false, "matchCriteriaId": "A77EB0E7-7FA7-4232-97DF-7C7587D163F1" } ], "operator": "OR" } ], "operator": "AND" } ]