Executive Summary

Informations
Name CVE-2008-1567 First vendor Publication 2008-03-31
Vendor Cve Last vendor Modification 2024-02-14

Security-Database Scoring CVSS v3

Cvss vector : CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N
Overall CVSS Score 5.5
Base Score 5.5 Environmental Score 5.5
impact SubScore 3.6 Temporal Score 5.5
Exploitabality Sub Score 1.8
 
Attack Vector Local Attack Complexity Low
Privileges Required Low User Interaction None
Scope Unchanged Confidentiality Impact High
Integrity Impact None Availability Impact None
Calculate full CVSS 3.0 Vectors scores

Security-Database Scoring CVSS v2

Cvss vector : (AV:L/AC:L/Au:N/C:P/I:N/A:N)
Cvss Base Score 2.1 Attack Range Local
Cvss Impact Score 2.9 Attack Complexity Low
Cvss Expoit Score 3.9 Authentication None Required
Calculate full CVSS 2.0 Vectors scores

Detail

phpMyAdmin before 2.11.5.1 stores the MySQL (1) username and (2) password, and the (3) Blowfish secret key, in cleartext in a Session file under /tmp, which allows local users to obtain sensitive information.

Original Source

Url : http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-1567

CAPEC : Common Attack Pattern Enumeration & Classification

Id Name
CAPEC-31 Accessing/Intercepting/Modifying HTTP Cookies
CAPEC-37 Lifting Data Embedded in Client Distributions
CAPEC-65 Passively Sniff and Capture Application Code Bound for Authorized Client
CAPEC-117 Data Interception Attacks
CAPEC-155 Screen Temporary Files for Sensitive Information
CAPEC-157 Sniffing Attacks
CAPEC-167 Lifting Sensitive Data from the Client
CAPEC-204 Lifting cached, sensitive data embedded in client distributions (thick or thin)
CAPEC-205 Lifting credential(s)/key material embedded in client distributions (thick or...
CAPEC-258 Passively Sniffing and Capturing Application Code Bound for an Authorized Cli...
CAPEC-259 Passively Sniffing and Capturing Application Code Bound for an Authorized Cli...
CAPEC-260 Passively Sniffing and Capturing Application Code Bound for an Authorized Cli...

CWE : Common Weakness Enumeration

% Id Name
100 % CWE-312 Cleartext Storage of Sensitive Information

CPE : Common Platform Enumeration

TypeDescriptionCount
Application 176
Os 1
Os 2
Os 3

OpenVAS Exploits

Date Description
2009-02-16 Name : Fedora Update for phpMyAdmin FEDORA-2008-2825
File : nvt/gb_fedora_2008_2825_phpMyAdmin_fc8.nasl
2009-02-16 Name : Fedora Update for phpMyAdmin FEDORA-2008-2874
File : nvt/gb_fedora_2008_2874_phpMyAdmin_fc7.nasl
2009-02-02 Name : SuSE Security Summary SUSE-SR:2009:003
File : nvt/suse_sr_2009_003.nasl
2008-09-04 Name : FreeBSD Ports: phpmyadmin
File : nvt/freebsd_phpmyadmin8.nasl
2008-04-30 Name : Debian Security Advisory DSA 1557-1 (phpmyadmin)
File : nvt/deb_1557_1.nasl

Open Source Vulnerability Database (OSVDB)

Id Description
43908 phpMyAdmin Session Data Credential / Secret Key Disclosure

phpMyAdmin contains a flaw that may lead to an unauthorized information disclosure. The issue is triggered when a malicious user accesses session data, which will disclose MySQL username and password information resulting in a loss of confidentiality.

Nessus® Vulnerability Scanner

Date Description
2009-07-21 Name : The remote openSUSE host is missing a security update.
File : suse_11_0_phpMyAdmin-090119.nasl - Type : ACT_GATHER_INFO
2009-01-22 Name : The remote openSUSE host is missing a security update.
File : suse_phpMyAdmin-5935.nasl - Type : ACT_GATHER_INFO
2008-11-18 Name : The remote openSUSE host is missing a security update.
File : suse_phpMyAdmin-5781.nasl - Type : ACT_GATHER_INFO
2008-04-28 Name : The remote Debian host is missing a security-related update.
File : debian_DSA-1557.nasl - Type : ACT_GATHER_INFO
2008-04-28 Name : The remote FreeBSD host is missing a security-related update.
File : freebsd_pkg_6eb1dc51124411ddbab70016179b2dd5.nasl - Type : ACT_GATHER_INFO
2008-04-04 Name : The remote Fedora host is missing a security update.
File : fedora_2008-2825.nasl - Type : ACT_GATHER_INFO
2008-04-04 Name : The remote Fedora host is missing a security update.
File : fedora_2008-2874.nasl - Type : ACT_GATHER_INFO

Sources (Detail)

Source Url
BID http://www.securityfocus.com/bid/28560
CONFIRM http://www.phpmyadmin.net/home_page/security.php?issue=PMASA-2008-2
DEBIAN http://www.debian.org/security/2008/dsa-1557
FEDORA https://www.redhat.com/archives/fedora-package-announce/2008-April/msg00031.html
https://www.redhat.com/archives/fedora-package-announce/2008-April/msg00080.html
MANDRIVA http://www.mandriva.com/security/advisories?name=MDVSA-2008:131
MISC http://sourceforge.net/tracker/index.php?func=detail&aid=1909711&grou...
SECUNIA http://secunia.com/advisories/29588
http://secunia.com/advisories/29613
http://secunia.com/advisories/29964
http://secunia.com/advisories/30816
http://secunia.com/advisories/32834
http://secunia.com/advisories/33822
SUSE http://lists.opensuse.org/opensuse-security-announce/2008-11/msg00002.html
http://lists.opensuse.org/opensuse-security-announce/2009-02/msg00000.html
VUPEN http://www.vupen.com/english/advisories/2008/1037/references
XF https://exchange.xforce.ibmcloud.com/vulnerabilities/41541

Alert History

If you want to see full details history, please login or register.
0
1
2
3
4
5
6
7
Date Informations
2024-02-14 21:28:21
  • Multiple Updates
2021-05-04 12:07:21
  • Multiple Updates
2021-04-22 01:07:45
  • Multiple Updates
2020-05-23 00:21:30
  • Multiple Updates
2017-08-08 09:23:59
  • Multiple Updates
2016-04-26 17:16:14
  • Multiple Updates
2014-02-17 10:44:27
  • Multiple Updates
2013-05-11 00:13:58
  • Multiple Updates