{"id":"CVE-2016-5097","details":"phpMyAdmin before 4.6.2 places tokens in query strings and does not arrange for them to be stripped before external navigation, which allows remote attackers to obtain sensitive information by reading (1) HTTP requests or (2) server logs.","modified":"2026-04-10T03:51:32.945161Z","published":"2016-07-05T01:59:05.673Z","related":["openSUSE-SU-2024:10054-1"],"references":[{"type":"WEB","url":"http://www.securitytracker.com/id/1035978"},{"type":"WEB","url":"http://lists.opensuse.org/opensuse-updates/2016-06/msg00043.html"},{"type":"ADVISORY","url":"https://security.gentoo.org/glsa/201701-32"},{"type":"FIX","url":"https://github.com/phpmyadmin/phpmyadmin/commit/11eb574242d2526107366d367ab5585fbe29578f"},{"type":"FIX","url":"https://github.com/phpmyadmin/phpmyadmin/commit/59e56bd63a5e023b797d82eb272cd074e3b4bfd1"},{"type":"FIX","url":"https://github.com/phpmyadmin/phpmyadmin/commit/5fc8020c5ba9cd2e38beb5dfe013faf2103cdf0f"},{"type":"FIX","url":"https://github.com/phpmyadmin/phpmyadmin/commit/8326aaebe54083d9726e153abdd303a141fe5ad3"},{"type":"FIX","url":"https://www.phpmyadmin.net/security/PMASA-2016-14"}],"affected":[{"ranges":[{"type":"GIT","repo":"https://github.com/phpmyadmin/phpmyadmin","events":[{"introduced":"0"},{"last_affected":"07fd0bce678e83d5f81d7a683f1052fe45764d0c"},{"fixed":"11eb574242d2526107366d367ab5585fbe29578f"},{"fixed":"59e56bd63a5e023b797d82eb272cd074e3b4bfd1"},{"fixed":"5fc8020c5ba9cd2e38beb5dfe013faf2103cdf0f"},{"fixed":"8326aaebe54083d9726e153abdd303a141fe5ad3"}],"database_specific":{"versions":[{"introduced":"0"},{"last_affected":"4.6.1"}]}}],"versions":["RELEASE_2_2_0","RELEASE_2_2_1","RELEASE_2_2_2","RELEASE_2_2_3","RELEASE_2_2_4","RELEASE_2_2_5","RELEASE_2_2_6","RELEASE_2_2_7PL1","RELEASE_2_3_0","RELEASE_2_3_1","RELEASE_2_3_2","RELEASE_2_3_3PL1","RELEASE_2_4_0","RELEASE_2_5_0","RELEASE_2_5_1","RELEASE_2_5_2","RELEASE_2_5_4","RELEASE_2_5_5PL1","RELEASE_2_5_6","RELEASE_2_5_7PL1","RELEASE_2_6_1PL3","RELEASE_2_6_2PL1","RELEASE_2_6_3PL1","RELEASE_2_6_4PL4","RELEASE_2_7_0PL2","RELEASE_2_8_0_4","RELEASE_2_8_1","RELEASE_2_8_2_4","RELEASE_2_9_0","RELEASE_3_4_0RC2","RELEASE_3_5_0ALPHA1","RELEASE_4_0_0ALPHA2","RELEASE_4_0_0BETA3","RELEASE_4_0_0RC1","RELEASE_4_1_0ALPHA1","RELEASE_4_1_0BETA1","RELEASE_4_1_0BETA2","RELEASE_4_2_0ALPHA2","RELEASE_4_2_0BETA1","RELEASE_4_6_0ALPHA1","RELEASE_4_6_0RC2","RELEASE_4_6_1"],"database_specific":{"source":"https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2016-5097.json","unresolved_ranges":[{"events":[{"introduced":"0"},{"last_affected":"13.1"}]}]}}],"schema_version":"1.7.5","severity":[{"type":"CVSS_V3","score":"CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N"}]}