{"id":"CVE-2016-2562","details":"The checkHTTP function in libraries/Config.class.php in phpMyAdmin 4.5.x before 4.5.5.1 does not verify X.509 certificates from api.github.com SSL servers, which allows man-in-the-middle attackers to spoof these servers and obtain sensitive information via a crafted certificate.","aliases":["GHSA-w8qg-j9fp-hrjf"],"modified":"2026-04-10T03:49:12.261259Z","published":"2016-03-01T11:59:04.643Z","related":["openSUSE-SU-2024:10054-1"],"references":[{"type":"WEB","url":"http://lists.fedoraproject.org/pipermail/package-announce/2016-March/178562.html"},{"type":"WEB","url":"http://lists.fedoraproject.org/pipermail/package-announce/2016-March/178869.html"},{"type":"FIX","url":"https://github.com/phpmyadmin/phpmyadmin/commit/e42b7e3aedd29dd0f7a48575f20bfc5aca0ff976"},{"type":"FIX","url":"https://www.phpmyadmin.net/security/PMASA-2016-13/"}],"affected":[{"ranges":[{"type":"GIT","repo":"https://github.com/phpmyadmin/phpmyadmin","events":[{"introduced":"0"},{"last_affected":"796e6ae09301a7ea8aae74fdb3bb44538c0f5151"},{"introduced":"0"},{"last_affected":"7ab576930ba6cd844c3bbffa6161b8b4669b969c"},{"introduced":"0"},{"last_affected":"9e08133f49f0b99868fec434762366d08a45b6f8"},{"introduced":"0"},{"last_affected":"ae7d3bb97a30805f98945fd4a442d023ae0ea24a"},{"introduced":"0"},{"last_affected":"b900c917101a15c78666579a28bab19b95bef669"},{"introduced":"0"},{"last_affected":"1ec51857f828c2d409ad76450695ca281ed89fc3"},{"introduced":"0"},{"last_affected":"a81ac373c82ec81351b3e5a30c5aa0b2b9e444af"},{"introduced":"0"},{"last_affected":"d89a6bda4c6de1bac301f737e290ae376c15be56"},{"introduced":"0"},{"last_affected":"2870a797f366589d89bc23c6cf29681f17ce3a89"},{"introduced":"0"},{"last_affected":"1cb223f320dbf29fd4ae00a21f5d6bb2e3f43524"},{"introduced":"0"},{"last_affected":"4b3c91b0f5c19afec21a909f80bd4fd0e0a056dc"},{"fixed":"e42b7e3aedd29dd0f7a48575f20bfc5aca0ff976"}],"database_specific":{"versions":[{"introduced":"0"},{"last_affected":"4.5.0"},{"introduced":"0"},{"last_affected":"4.5.0-rc1"},{"introduced":"0"},{"last_affected":"4.5.0.1"},{"introduced":"0"},{"last_affected":"4.5.0.2"},{"introduced":"0"},{"last_affected":"4.5.1"},{"introduced":"0"},{"last_affected":"4.5.2"},{"introduced":"0"},{"last_affected":"4.5.3"},{"introduced":"0"},{"last_affected":"4.5.3.1"},{"introduced":"0"},{"last_affected":"4.5.4"},{"introduced":"0"},{"last_affected":"4.5.4.1"},{"introduced":"0"},{"last_affected":"4.5.5"}]}}],"versions":["RELEASE_2_2_0","RELEASE_2_2_1","RELEASE_2_2_2","RELEASE_2_2_3","RELEASE_2_2_4","RELEASE_2_2_5","RELEASE_2_2_6","RELEASE_2_2_7PL1","RELEASE_2_3_0","RELEASE_2_3_1","RELEASE_2_3_2","RELEASE_2_3_3PL1","RELEASE_2_4_0","RELEASE_2_5_0","RELEASE_2_5_1","RELEASE_2_5_2","RELEASE_2_5_4","RELEASE_2_5_5PL1","RELEASE_2_5_6","RELEASE_2_5_7PL1","RELEASE_2_6_1PL3","RELEASE_2_6_2PL1","RELEASE_2_6_3PL1","RELEASE_2_6_4PL4","RELEASE_2_7_0PL2","RELEASE_2_8_0_4","RELEASE_2_8_1","RELEASE_2_8_2_4","RELEASE_2_9_0","RELEASE_3_4_0RC2","RELEASE_3_5_0ALPHA1","RELEASE_4_0_0ALPHA2","RELEASE_4_0_0BETA3","RELEASE_4_0_0RC1","RELEASE_4_1_0ALPHA1","RELEASE_4_1_0BETA1","RELEASE_4_1_0BETA2","RELEASE_4_2_0ALPHA2","RELEASE_4_2_0BETA1","RELEASE_4_5_0","RELEASE_4_5_0RC1","RELEASE_4_5_0_1","RELEASE_4_5_0_2","RELEASE_4_5_1","RELEASE_4_5_2","RELEASE_4_5_3","RELEASE_4_5_3_1","RELEASE_4_5_4","RELEASE_4_5_4_1","RELEASE_4_5_5"],"database_specific":{"unresolved_ranges":[{"events":[{"introduced":"0"},{"last_affected":"4.5.0-beta1"}]},{"events":[{"introduced":"0"},{"last_affected":"4.5.0-beta2"}]}],"source":"https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2016-2562.json"}}],"schema_version":"1.7.5","severity":[{"type":"CVSS_V3","score":"CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:C/C:N/I:H/A:N"}]}