{"id":"MGASA-2022-0036","summary":"Updated phpmyadmin packages fix security vulnerability","details":"A flaw was identified in how phpMyAdmin processes two factor\nauthentication; a user could potentially manipulate their account to\nbypass two factor authentication in subsequent authentication sessions\n(PMASA-2022-1).\n\nA series of weaknesses was identified allowing a malicious user to submit\nmalicious information to present an XSS or HTML injection attack in the\ngraphical setup page (PMASA-2022-2).\n\nIn some scenarios, potentially sensitive information such as a the\ndatabase name can be part of the URL. This can now be optionally\nencrypted.\n\nDuring a failed log on attempt, the error message reveals the target\ndatabase server's hostname or IP address. This can reveal some\ninformation about the network infrastructure to an attacker.\n\nFixed some situations where a user is logged out when working with more\nthan one server\n\nFixed a problem with assigning privileges to a user using the multiselect\nlist when the database name has an underscore\n\nEnable cookie parameter \"SameSite\" when the PHP version is 7.3 or newer.\n","modified":"2026-04-16T00:10:21.656691832Z","published":"2022-01-25T12:13:11Z","upstream":["CVE-2022-23807","CVE-2022-23808"],"references":[{"type":"ADVISORY","url":"https://advisories.mageia.org/MGASA-2022-0036.html"},{"type":"REPORT","url":"https://bugs.mageia.org/show_bug.cgi?id=29931"},{"type":"WEB","url":"https://www.phpmyadmin.net/news/2022/1/22/phpmyadmin-498-512-and-520-rc1-are-released/"}],"affected":[{"package":{"name":"phpmyadmin","ecosystem":"Mageia:8","purl":"pkg:rpm/mageia/phpmyadmin?arch=source&distro=mageia-8"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"5.1.2-1.mga8"}]}],"ecosystem_specific":{"section":"core"},"database_specific":{"source":"https://advisories.mageia.org/MGASA-2022-0036.json"}}],"schema_version":"1.7.5","credits":[{"name":"Mageia","contact":["https://wiki.mageia.org/en/Packages_Security_Team"],"type":"COORDINATOR"}]}