A vulnerability was found in phpRedisAdmin up to 1.16.1. It has been classified as problematic. This affects the function authHttpDigest of the file includes/login.inc.php. The manipulation of the argument response leads to use of wrong operator in string comparison. Upgrading to version 1.16.2 is able to address this issue. The name of the patch is 31aa7661e6db6f4dffbf9a635817832a0a11c7d9. It is recommended to upgrade the affected component. The associated identifier of this vulnerability is VDB-216267.
References
Link | Resource |
---|---|
https://github.com/erikdubbelboer/phpRedisAdmin/commit/31aa7661e6db6f4dffbf9a635817832a0a11c7d9 | Patch Third Party Advisory |
https://github.com/erikdubbelboer/phpRedisAdmin/releases/tag/v1.16.2 | Release Notes Third Party Advisory |
https://vuldb.com/?id.216267 | Permissions Required Third Party Advisory VDB Entry |
History
No history.
MITRE Information
Status: PUBLISHED
Assigner: VulDB
Published: 2022-12-19T00:00:00
Updated: 2022-12-24T21:16:33.061Z
Reserved: 2022-12-19T00:00:00
Link: CVE-2021-4259
JSON object: View
NVD Information
Status : Modified
Published: 2022-12-19T14:15:10.497
Modified: 2024-05-17T02:03:30.150
Link: CVE-2021-4259
JSON object: View
Redhat Information
No data.
CWE