Sensitive Data in URL GET Query Parameters
Because user SQL queries are part of the URL, sensitive information made as part of a user query can be exposed by clicking on external links to attackers monitoring user GET query parameters or included in the webserver logs.
Updated to include CVE ID and added commits fixing most of problems in 4.0.10 branch.
We consider this to be non-critical.
Avoid clicking on external links in phpMyAdmin which are not redirected through url.php script.
All versions prior 4.6.2 are affected.
Upgrade to phpMyAdmin 4.6.2 or newer or apply patches listed below.
This issue was found thanks to Mozilla SOS program.
Assigned CVE ids: CVE-2016-5097
CWE ids: CWE-661
The following commits have been made on the 4.6 branch to fix this issue:
The following commits have been made on the 4.0 branch to fix this issue:
For further information and in case of questions, please contact the phpMyAdmin team. Our website is phpmyadmin.net.