Ecosyste.ms: Advisories
An open API service providing security vulnerability metadata for many open source software ecosystems.
Security Advisories: GSA_kwCzR0hTQS12NmZoLXZnMjItcjZjbc4AAcbd
phpMyAdmin ReCaptcha bypass
libraries/plugins/auth/AuthenticationCookie.class.php in phpMyAdmin 4.3.x before 4.3.13.2 and 4.4.x before 4.4.14.1 allows remote attackers to bypass a multiple-reCaptcha protection mechanism against brute-force credential guessing by providing a correct response to a single reCaptcha.
Permalink: https://github.com/advisories/GHSA-v6fh-vg22-r6cmJSON: https://advisories.ecosyste.ms/api/v1/advisories/GSA_kwCzR0hTQS12NmZoLXZnMjItcjZjbc4AAcbd
Source: GitHub Advisory Database
Origin: Unspecified
Severity: Moderate
Classification: General
Published: almost 2 years ago
Updated: 9 months ago
Identifiers: GHSA-v6fh-vg22-r6cm, CVE-2015-6830
References:
- https://nvd.nist.gov/vuln/detail/CVE-2015-6830
- https://github.com/phpmyadmin/phpmyadmin/commit/785f4e2711848eb8945894199d5870253a88584e
- https://www.phpmyadmin.net/security/PMASA-2015-4/
- http://lists.fedoraproject.org/pipermail/package-announce/2015-September/166294.html
- http://lists.fedoraproject.org/pipermail/package-announce/2015-September/166307.html
- http://lists.fedoraproject.org/pipermail/package-announce/2015-September/166531.html
- http://www.debian.org/security/2015/dsa-3382
- https://github.com/phpmyadmin/phpmyadmin/commit/0314e67900f01410bc8c81c58a40dc0515e3c91d
- https://web.archive.org/web/20200228052837/http://www.securityfocus.com/bid/76674
- https://web.archive.org/web/20211215060142/http://www.securitytracker.com/id/1033546
- https://github.com/advisories/GHSA-v6fh-vg22-r6cm
Blast Radius: 0.0
Affected Packages
packagist:phpmyadmin/phpmyadmin
Dependent packages: 4Dependent repositories: 15
Downloads: 297,418 total
Affected Version Ranges: >= 4.4.0, < 4.4.14.1, >= 4.3.0, < 4.3.13.2
Fixed in: 4.4.14.1, 4.3.13.2
All affected versions:
All unaffected versions: 4.0.0, 4.0.1, 4.0.2, 4.0.3, 4.0.4, 4.0.5, 4.0.6, 4.0.7, 4.0.8, 4.0.9, 4.0.10, 4.7.0, 4.7.1, 4.7.2, 4.7.3, 4.7.4, 4.7.5, 4.7.6, 4.7.7, 4.7.8, 4.7.9, 4.8.0, 4.8.1, 4.8.2, 4.8.3, 4.8.4, 4.8.5, 4.9.0, 4.9.1, 4.9.2, 4.9.3, 4.9.4, 4.9.5, 4.9.6, 4.9.7, 4.9.8, 4.9.9, 4.9.10, 4.9.11, 5.0.0, 5.0.1, 5.0.2, 5.0.3, 5.0.4, 5.1.0, 5.1.1, 5.1.2, 5.1.3, 5.1.4, 5.2.0, 5.2.1