Vulnerability Description
A vulnerability was found in phpRedisAdmin up to 1.16.1. It has been classified as problematic. This affects the function authHttpDigest of the file includes/login.inc.php. The manipulation of the argument response leads to use of wrong operator in string comparison. Upgrading to version 1.16.2 is able to address this issue. The name of the patch is 31aa7661e6db6f4dffbf9a635817832a0a11c7d9. It is recommended to upgrade the affected component. The associated identifier of this vulnerability is VDB-216267.
CVSS Score
MEDIUM
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Phpredisadmin Project | Phpredisadmin | < 1.16.2 |
Related Weaknesses (CWE)
References
- https://github.com/erikdubbelboer/phpRedisAdmin/commit/31aa7661e6db6f4dffbf9a635PatchThird Party Advisory
- https://github.com/erikdubbelboer/phpRedisAdmin/releases/tag/v1.16.2Release NotesThird Party Advisory
- https://vuldb.com/?id.216267Permissions RequiredThird Party AdvisoryVDB Entry
- https://github.com/erikdubbelboer/phpRedisAdmin/commit/31aa7661e6db6f4dffbf9a635PatchThird Party Advisory
- https://github.com/erikdubbelboer/phpRedisAdmin/releases/tag/v1.16.2Release NotesThird Party Advisory
- https://vuldb.com/?id.216267Permissions RequiredThird Party AdvisoryVDB Entry
FAQ
What is CVE-2021-4259?
CVE-2021-4259 is a vulnerability with a CVSS score of 5.0 (MEDIUM). A vulnerability was found in phpRedisAdmin up to 1.16.1. It has been classified as problematic. This affects the function authHttpDigest of the file includes/login.inc.php. The manipulation of the arg...
How severe is CVE-2021-4259?
CVE-2021-4259 has been rated MEDIUM with a CVSS base score of 5.0/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2021-4259?
Check the references section above for vendor advisories and patch information. Affected products include: Phpredisadmin Project Phpredisadmin.