Executive Summary
Summary | |
---|---|
Title | phpmyadmin security update |
Informations | |||
---|---|---|---|
Name | DSA-2286 | First vendor Publication | 2011-07-26 |
Vendor | Debian | Last vendor Modification | 2011-07-26 |
Severity (Vendor) | N/A | Revision | 1 |
Security-Database Scoring CVSS v3
Cvss vector : N/A | |||
---|---|---|---|
Overall CVSS Score | NA | ||
Base Score | NA | Environmental Score | NA |
impact SubScore | NA | Temporal Score | NA |
Exploitabality Sub Score | NA | ||
Calculate full CVSS 3.0 Vectors scores |
Security-Database Scoring CVSS v2
Cvss vector : (AV:N/AC:L/Au:N/C:P/I:P/A:P) | |||
---|---|---|---|
Cvss Base Score | 7.5 | Attack Range | Network |
Cvss Impact Score | 6.4 | Attack Complexity | Low |
Cvss Expoit Score | 10 | Authentication | None Required |
Calculate full CVSS 2.0 Vectors scores |
Detail
Several vulnerabilities were discovered in phpMyAdmin, a tool to administrate MySQL over the web. The Common Vulnerabilities and Exposures project identifies the following problems: CVE-2011-2505 Possible session manipulation in Swekey authentication. CVE-2011-2506 Possible code injection in setup script, in case session variables are compromised. CVE-2011-2507 Regular expression quoting issue in Synchronize code. CVE-2011-2508 Possible directory traversal in MIME-type transformation. CVE-2011-2642 Cross site scripting in table Print view when the attacker can create crafted table names. No CVE name yet Possible superglobal and local variables manipulation in Swekey authentication. (PMASA-2011-12) The oldstable distribution (lenny) is only affected by CVE-2011-2642, which has been fixed in version 2.11.8.1-5+lenny9. For the stable distribution (squeeze), these problems have been fixed in version 3.3.7-6. For the testing distribution (wheezy) and unstable distribution (sid), these problems have been fixed in version 3.4.3.2-1. We recommend that you upgrade your phpymadmin packages. |
Original Source
Url : http://www.debian.org/security/2011/dsa-2286 |
CWE : Common Weakness Enumeration
% | Id | Name |
---|---|---|
50 % | CWE-94 | Failure to Control Generation of Code ('Code Injection') |
17 % | CWE-79 | Failure to Preserve Web Page Structure ('Cross-site Scripting') (CWE/SANS Top 25) |
17 % | CWE-22 | Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') (CWE/SANS Top 25) |
17 % | CWE-20 | Improper Input Validation |
OVAL Definitions
Definition Id: oval:org.mitre.oval:def:12744 | |||
Oval ID: | oval:org.mitre.oval:def:12744 | ||
Title: | DSA-2286-1 phpymadmin -- several | ||
Description: | Several vulnerabilities were discovered in phpMyAdmin, a tool to administrate MySQL over the web. The Common Vulnerabilities and Exposures project identifies the following problems: CVE-2011-2505 Possible session manipulation in Swekey authentication. CVE-2011-2506 Possible code injection in setup script, in case session variables are compromised. CVE-2011-2507 Regular expression quoting issue in Synchronize code. CVE-2011-2508 Possible directory traversal in MIME-type transformation. CVE-2011-2642 Cross site scripting in table Print view when the attacker can create crafted table names. No CVE name yet Possible superglobal and local variables manipulation in Swekey authentication. The oldstable distribution is only affected by CVE-2011-2642, which has been fixed in version 2.11.8.1-5+lenny9. | ||
Family: | unix | Class: | patch |
Reference(s): | DSA-2286-1 CVE-2011-2505 CVE-2011-2506 CVE-2011-2507 CVE-2011-2508 CVE-2011-2642 | Version: | 5 |
Platform(s): | Debian GNU/Linux 6.0 Debian GNU/kFreeBSD 6.0 | Product(s): | phpymadmin |
Definition Synopsis: | |||
CPE : Common Platform Enumeration
ExploitDB Exploits
id | Description |
---|---|
2011-07-09 | phpMyAdmin 3.x Swekey Remote Code Injection Exploit |
2011-07-08 | phpMyAdmin3 (pma3) Remote Code Execution Exploit |
OpenVAS Exploits
Date | Description |
---|---|
2012-02-12 | Name : Gentoo Security Advisory GLSA 201201-01 (phpMyAdmin) File : nvt/glsa_201201_01.nasl |
2011-08-18 | Name : Mandriva Update for phpmyadmin MDVSA-2011:124 (phpmyadmin) File : nvt/gb_mandriva_MDVSA_2011_124.nasl |
2011-08-12 | Name : Fedora Update for phpMyAdmin FEDORA-2011-9725 File : nvt/gb_fedora_2011_9725_phpMyAdmin_fc14.nasl |
2011-08-12 | Name : Fedora Update for phpMyAdmin FEDORA-2011-9734 File : nvt/gb_fedora_2011_9734_phpMyAdmin_fc15.nasl |
2011-08-07 | Name : FreeBSD Ports: phpMyAdmin File : nvt/freebsd_phpMyAdmin24.nasl |
2011-08-03 | Name : FreeBSD Ports: phpmyadmin File : nvt/freebsd_phpmyadmin11.nasl |
2011-07-18 | Name : Fedora Update for phpMyAdmin FEDORA-2011-9144 File : nvt/gb_fedora_2011_9144_phpMyAdmin_fc14.nasl |
2011-07-11 | Name : phpMyAdmin Prior to 3.3.10.2 and 3.4.3.1 Multiple Remote Vulnerabilities File : nvt/gb_phpmyadmin_48563.nasl |
Open Source Vulnerability Database (OSVDB)
Id | Description |
---|---|
74112 | phpMyAdmin Swekey Authentication Arbitrary Session Variable Overwrite |
74109 | phpMyAdmin Table Print View Table Name Parameter XSS phpMyAdmin contains a flaw that allows a remote cross-site scripting (XSS) attack. This flaw exists because the application does not validate the 'Table Name' parameter upon submission to the Table Print View script. This may allow a user to create a specially crafted URL that would execute arbitrary script code in a user's browser within the trust relationship between their browser and the server. |
73614 | phpMyAdmin libraries/display_tbl.lib.php PMA_displayTableBody() Function Trav... phpMyAdmin contains a flaw that may allow a remote attacker to execute arbitrary commands or code. The issue is due to the libraries/display_tbl.lib.php script not properly sanitizing user input, specifically directory traversal style attacks (e.g., ../../) supplied to the 'PMA_displayTableBody()' function. This may allow an attacker to include a file from the targeted host that contains arbitrary commands or code that will be executed by the vulnerable script. Such attacks are limited due to the script only calling files already on the target host. In addition, this flaw can potentially be used to disclose the contents of any file on the system accessible by the web server. |
73613 | phpMyAdmin libraries/server_synchronize.lib.php Multiple Function /e Modifier... |
73612 | phpMyAdmin SESSION Superglobal Array Key Manipulation Arbitrary PHP Code Exec... |
73611 | phpMyAdmin libraries/auth/swekey/swekey.auth.lib.php Swekey_login() Function ... |
Snort® IPS/IDS
Date | Description |
---|---|
2014-01-10 | phpMyAdmin session_to_unset session variable injection attempt RuleID : 19553 - Revision : 6 - Type : SERVER-WEBAPP |
Nessus® Vulnerability Scanner
Date | Description |
---|---|
2012-01-05 | Name : The remote Gentoo host is missing one or more security-related patches. File : gentoo_GLSA-201201-01.nasl - Type : ACT_GATHER_INFO |
2011-12-20 | Name : The remote web server contains a PHP application that is affected by multiple... File : phpmyadmin_pmasa_2011_8.nasl - Type : ACT_GATHER_INFO |
2011-08-05 | Name : The remote Fedora host is missing a security update. File : fedora_2011-9725.nasl - Type : ACT_GATHER_INFO |
2011-08-05 | Name : The remote Fedora host is missing a security update. File : fedora_2011-9734.nasl - Type : ACT_GATHER_INFO |
2011-07-28 | Name : The remote Debian host is missing a security-related update. File : debian_DSA-2286.nasl - Type : ACT_GATHER_INFO |
2011-07-26 | Name : The remote FreeBSD host is missing a security-related update. File : freebsd_pkg_d79fc873b5f911e089b4001ec9578670.nasl - Type : ACT_GATHER_INFO |
2011-07-18 | Name : The remote Fedora host is missing a security update. File : fedora_2011-9144.nasl - Type : ACT_GATHER_INFO |
2011-07-05 | Name : The remote FreeBSD host is missing a security-related update. File : freebsd_pkg_7e4e5c53a56c11e0b18000216aa06fc2.nasl - Type : ACT_GATHER_INFO |
Alert History
Date | Informations |
---|---|
2014-02-17 11:30:21 |
|