CVE-2013-5000
Published Jul 31, 2013
Last updated 11 years ago
Overview
- Description
- phpMyAdmin 3.5.x before 3.5.8.2 allows remote attackers to obtain sensitive information via an invalid request, which reveals the installation path in an error message, related to config.default.php and other files.
- Source
- cve@mitre.org
- NVD status
- Analyzed
Social media
- Hype score
- Not currently trending
Risk scores
CVSS 2.0
- Type
- Primary
- Base score
- 5
- Impact score
- 2.9
- Exploitability score
- 10
- Vector string
- AV:N/AC:L/Au:N/C:P/I:N/A:N
Weaknesses
- nvd@nist.gov
- CWE-200
Configurations
[ { "nodes": [ { "negate": false, "cpeMatch": [ { "criteria": "cpe:2.3:a:phpmyadmin:phpmyadmin:3.5.0.0:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "2577DB75-9893-4496-B9B8-22F4D7C70D8B" }, { "criteria": "cpe:2.3:a:phpmyadmin:phpmyadmin:3.5.1.0:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "3BBC76AB-567B-4081-8520-D4BB2211CA91" }, { "criteria": "cpe:2.3:a:phpmyadmin:phpmyadmin:3.5.2.0:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "EDFD7186-12C3-4FA6-951E-288063262EAE" }, { "criteria": "cpe:2.3:a:phpmyadmin:phpmyadmin:3.5.2.1:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "C4E23EA5-8FD8-441A-8CB6-F1E77AA0D73B" }, { "criteria": "cpe:2.3:a:phpmyadmin:phpmyadmin:3.5.2.2:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "B5FE1328-F2E1-45C8-80ED-0560DAB666EE" }, { "criteria": "cpe:2.3:a:phpmyadmin:phpmyadmin:3.5.3.0:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "EC675B47-0373-442E-9BCD-35D79355073C" }, { "criteria": "cpe:2.3:a:phpmyadmin:phpmyadmin:3.5.4:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "96E2C613-B1E9-4DB5-AA7D-165E5093452F" }, { "criteria": "cpe:2.3:a:phpmyadmin:phpmyadmin:3.5.5:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "7B0E7188-E3DE-4A9C-9B9B-31E7276F74AF" }, { "criteria": "cpe:2.3:a:phpmyadmin:phpmyadmin:3.5.6:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "3E6D5B72-CA57-4054-B002-56C03856D740" }, { "criteria": "cpe:2.3:a:phpmyadmin:phpmyadmin:3.5.7:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "71325EEA-441A-4D04-85E1-B7627C15ECE8" }, { "criteria": "cpe:2.3:a:phpmyadmin:phpmyadmin:3.5.7:rc1:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "EE098CE1-0FA0-48C0-8F9F-CC9150E96C40" }, { "criteria": "cpe:2.3:a:phpmyadmin:phpmyadmin:3.5.8:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "C6CBB65B-F6F8-4B5C-9782-4ECCEAB756E5" }, { "criteria": "cpe:2.3:a:phpmyadmin:phpmyadmin:3.5.8:rc1:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "56245F7F-C483-42C1-9D30-AA39C3441591" }, { "criteria": "cpe:2.3:a:phpmyadmin:phpmyadmin:3.5.8.1:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "022DB5CB-E815-484A-BA40-2267E864D825" } ], "operator": "OR" } ] } ]