CVE-2011-0987
Severity CVSS v4.0:
Pending analysis
Type:
CWE-20
Input Validation
Publication date:
14/02/2011
Last modified:
11/04/2025
Description
The PMA_Bookmark_get function in libraries/bookmark.lib.php in phpMyAdmin 2.11.x before 2.11.11.3, and 3.3.x before 3.3.9.2, does not properly restrict bookmark queries, which makes it easier for remote authenticated users to trigger another user's execution of a SQL query by creating a bookmark.
Impact
Base Score 2.0
6.50
Severity 2.0
MEDIUM
Vulnerable products and versions
| CPE | From | Up to |
|---|---|---|
| cpe:2.3:a:phpmyadmin:phpmyadmin:2.11.0:*:*:*:*:*:*:* | ||
| cpe:2.3:a:phpmyadmin:phpmyadmin:2.11.1.0:*:*:*:*:*:*:* | ||
| cpe:2.3:a:phpmyadmin:phpmyadmin:2.11.1.1:*:*:*:*:*:*:* | ||
| cpe:2.3:a:phpmyadmin:phpmyadmin:2.11.1.2:*:*:*:*:*:*:* | ||
| cpe:2.3:a:phpmyadmin:phpmyadmin:2.11.2.0:*:*:*:*:*:*:* | ||
| cpe:2.3:a:phpmyadmin:phpmyadmin:2.11.2.1:*:*:*:*:*:*:* | ||
| cpe:2.3:a:phpmyadmin:phpmyadmin:2.11.2.2:*:*:*:*:*:*:* | ||
| cpe:2.3:a:phpmyadmin:phpmyadmin:2.11.3.0:*:*:*:*:*:*:* | ||
| cpe:2.3:a:phpmyadmin:phpmyadmin:2.11.4.0:*:*:*:*:*:*:* | ||
| cpe:2.3:a:phpmyadmin:phpmyadmin:2.11.5.0:*:*:*:*:*:*:* | ||
| cpe:2.3:a:phpmyadmin:phpmyadmin:2.11.5.1:*:*:*:*:*:*:* | ||
| cpe:2.3:a:phpmyadmin:phpmyadmin:2.11.5.2:*:*:*:*:*:*:* | ||
| cpe:2.3:a:phpmyadmin:phpmyadmin:2.11.6.0:*:*:*:*:*:*:* | ||
| cpe:2.3:a:phpmyadmin:phpmyadmin:2.11.7.0:*:*:*:*:*:*:* | ||
| cpe:2.3:a:phpmyadmin:phpmyadmin:2.11.7.1:*:*:*:*:*:*:* |
To consult the complete list of CPE names with products and versions, see this page
References to Advisories, Solutions, and Tools
- http://lists.fedoraproject.org/pipermail/package-announce/2011-February/054349.html
- http://lists.fedoraproject.org/pipermail/package-announce/2011-February/054355.html
- http://lists.fedoraproject.org/pipermail/package-announce/2011-March/054525.html
- http://phpmyadmin.git.sourceforge.net/git/gitweb.cgi?p=phpmyadmin/phpmyadmin%3Ba%3Dcommit%3Bh%3Da5464b4daff0059cdf8c9e5f4d54a80e2dd2a5b0
- http://secunia.com/advisories/43324
- http://secunia.com/advisories/43391
- http://secunia.com/advisories/43478
- http://www.debian.org/security/2011/dsa-2167
- http://www.mandriva.com/security/advisories?name=MDVSA-2011%3A026
- http://www.phpmyadmin.net/home_page/security/PMASA-2011-2.php
- http://www.securityfocus.com/bid/46359
- http://www.vupen.com/english/advisories/2011/0381
- http://www.vupen.com/english/advisories/2011/0385
- http://www.vupen.com/english/advisories/2011/0409
- http://www.vupen.com/english/advisories/2011/0512
- http://www.vupen.com/english/advisories/2011/0570
- https://exchange.xforce.ibmcloud.com/vulnerabilities/65390
- http://lists.fedoraproject.org/pipermail/package-announce/2011-February/054349.html
- http://lists.fedoraproject.org/pipermail/package-announce/2011-February/054355.html
- http://lists.fedoraproject.org/pipermail/package-announce/2011-March/054525.html
- http://phpmyadmin.git.sourceforge.net/git/gitweb.cgi?p=phpmyadmin/phpmyadmin%3Ba%3Dcommit%3Bh%3Da5464b4daff0059cdf8c9e5f4d54a80e2dd2a5b0
- http://secunia.com/advisories/43324
- http://secunia.com/advisories/43391
- http://secunia.com/advisories/43478
- http://www.debian.org/security/2011/dsa-2167
- http://www.mandriva.com/security/advisories?name=MDVSA-2011%3A026
- http://www.phpmyadmin.net/home_page/security/PMASA-2011-2.php
- http://www.securityfocus.com/bid/46359
- http://www.vupen.com/english/advisories/2011/0381
- http://www.vupen.com/english/advisories/2011/0385
- http://www.vupen.com/english/advisories/2011/0409
- http://www.vupen.com/english/advisories/2011/0512
- http://www.vupen.com/english/advisories/2011/0570
- https://exchange.xforce.ibmcloud.com/vulnerabilities/65390



