Executive Summary
Summary | |
---|---|
Title | New phpmyadmin packages fix several vulnerabilities |
Informations | |||
---|---|---|---|
Name | DSA-1557 | First vendor Publication | 2008-04-24 |
Vendor | Debian | Last vendor Modification | 2008-04-24 |
Severity (Vendor) | N/A | Revision | 1 |
Security-Database Scoring CVSS v3
Cvss vector : N/A | |||
---|---|---|---|
Overall CVSS Score | NA | ||
Base Score | NA | Environmental Score | NA |
impact SubScore | NA | Temporal Score | NA |
Exploitabality Sub Score | NA | ||
Calculate full CVSS 3.0 Vectors scores |
Security-Database Scoring CVSS v2
Cvss vector : (AV:N/AC:H/Au:N/C:P/I:P/A:P) | |||
---|---|---|---|
Cvss Base Score | 5.1 | Attack Range | Network |
Cvss Impact Score | 6.4 | Attack Complexity | High |
Cvss Expoit Score | 4.9 | Authentication | None Required |
Calculate full CVSS 2.0 Vectors scores |
Detail
Several remote vulnerabilities have been discovered in phpMyAdmin, an application to administrate MySQL over the WWW. The Common Vulnerabilities and Exposures project identifies the following problems: CVE-2008-1924 Attackers with CREATE table permissions were allowed to read arbitrary files readable by the webserver via a crafted HTTP POST request. CVE-2008-1567 The PHP session data file stored the username and password of a logged in user, which in some setups can be read by a local user. CVE-2008-1149 Cross site scripting and SQL injection were possible by attackers that had permission to create cookies in the same cookie domain as phpMyAdmin runs in. For the stable distribution (etch), these problems have been fixed in version 4:2.9.1.1-7. For the unstable distribution (sid), these problems have been fixed in version 4:2.11.5.2-1. We recommend that you upgrade your phpmyadmin package. |
Original Source
Url : http://www.debian.org/security/2008/dsa-1557 |
CAPEC : Common Attack Pattern Enumeration & Classification
Id | Name |
---|---|
CAPEC-31 | Accessing/Intercepting/Modifying HTTP Cookies |
CAPEC-37 | Lifting Data Embedded in Client Distributions |
CAPEC-65 | Passively Sniff and Capture Application Code Bound for Authorized Client |
CAPEC-117 | Data Interception Attacks |
CAPEC-155 | Screen Temporary Files for Sensitive Information |
CAPEC-157 | Sniffing Attacks |
CAPEC-167 | Lifting Sensitive Data from the Client |
CAPEC-204 | Lifting cached, sensitive data embedded in client distributions (thick or thin) |
CAPEC-205 | Lifting credential(s)/key material embedded in client distributions (thick or... |
CAPEC-258 | Passively Sniffing and Capturing Application Code Bound for an Authorized Cli... |
CAPEC-259 | Passively Sniffing and Capturing Application Code Bound for an Authorized Cli... |
CAPEC-260 | Passively Sniffing and Capturing Application Code Bound for an Authorized Cli... |
CWE : Common Weakness Enumeration
% | Id | Name |
---|---|---|
25 % | CWE-352 | Cross-Site Request Forgery (CSRF) (CWE/SANS Top 25) |
25 % | CWE-312 | Cleartext Storage of Sensitive Information |
25 % | CWE-200 | Information Exposure |
25 % | CWE-89 | Improper Sanitization of Special Elements used in an SQL Command ('SQL Injection') (CWE/SANS Top 25) |
OVAL Definitions
Definition Id: oval:org.mitre.oval:def:18667 | |||
Oval ID: | oval:org.mitre.oval:def:18667 | ||
Title: | DSA-1557-1 phpmyadmin - several vulnerabilities | ||
Description: | Several remote vulnerabilities have been discovered in phpMyAdmin, an application to administrate MySQL over the WWW. | ||
Family: | unix | Class: | patch |
Reference(s): | DSA-1557-1 CVE-2008-1149 CVE-2008-1567 CVE-2008-1924 | Version: | 5 |
Platform(s): | Debian GNU/Linux 4.0 | Product(s): | phpmyadmin |
Definition Synopsis: | |||
Definition Id: oval:org.mitre.oval:def:8041 | |||
Oval ID: | oval:org.mitre.oval:def:8041 | ||
Title: | DSA-1557 phpmyadmin -- insufficient input sanitising | ||
Description: | Several remote vulnerabilities have been discovered in phpMyAdmin, an application to administrate MySQL over the WWW. The Common Vulnerabilities and Exposures project identifies the following problems: Attackers with CREATE table permissions were allowed to read arbitrary files readable by the webserver via a crafted HTTP POST request. The PHP session data file stored the username and password of a logged in user, which in some setups can be read by a local user. Cross site scripting and SQL injection were possible by attackers that had permission to create cookies in the same cookie domain as phpMyAdmin runs in. | ||
Family: | unix | Class: | patch |
Reference(s): | DSA-1557 CVE-2008-1149 CVE-2008-1567 CVE-2008-1924 | Version: | 5 |
Platform(s): | Debian GNU/Linux 4.0 | Product(s): | phpmyadmin |
Definition Synopsis: | |||
CPE : Common Platform Enumeration
OpenVAS Exploits
Date | Description |
---|---|
2009-02-16 | Name : Fedora Update for phpMyAdmin FEDORA-2008-2825 File : nvt/gb_fedora_2008_2825_phpMyAdmin_fc8.nasl |
2009-02-16 | Name : Fedora Update for phpMyAdmin FEDORA-2008-2874 File : nvt/gb_fedora_2008_2874_phpMyAdmin_fc7.nasl |
2009-02-02 | Name : SuSE Security Summary SUSE-SR:2009:003 File : nvt/suse_sr_2009_003.nasl |
2008-09-24 | Name : Gentoo Security Advisory GLSA 200803-15 (phpmyadmin) File : nvt/glsa_200803_15.nasl |
2008-09-24 | Name : Gentoo Security Advisory GLSA 200805-02 (phpmyadmin) File : nvt/glsa_200805_02.nasl |
2008-09-04 | Name : FreeBSD Ports: phpmyadmin File : nvt/freebsd_phpmyadmin6.nasl |
2008-09-04 | Name : FreeBSD Ports: phpmyadmin File : nvt/freebsd_phpmyadmin7.nasl |
2008-09-04 | Name : FreeBSD Ports: phpmyadmin File : nvt/freebsd_phpmyadmin8.nasl |
2008-04-30 | Name : Debian Security Advisory DSA 1557-1 (phpmyadmin) File : nvt/deb_1557_1.nasl |
Open Source Vulnerability Database (OSVDB)
Id | Description |
---|---|
44577 | phpMyAdmin Crafted HTTP Request UploadDir Parameter Arbitrary File Access |
43908 | phpMyAdmin Session Data Credential / Secret Key Disclosure phpMyAdmin contains a flaw that may lead to an unauthorized information disclosure. The issue is triggered when a malicious user accesses session data, which will disclose MySQL username and password information resulting in a loss of confidentiality. |
43051 | phpMyAdmin Crafted Cookie $_REQUEST Superglobal Overwrite |
Nessus® Vulnerability Scanner
Date | Description |
---|---|
2009-07-21 | Name : The remote openSUSE host is missing a security update. File : suse_11_0_phpMyAdmin-090119.nasl - Type : ACT_GATHER_INFO |
2009-01-22 | Name : The remote openSUSE host is missing a security update. File : suse_phpMyAdmin-5935.nasl - Type : ACT_GATHER_INFO |
2008-11-18 | Name : The remote openSUSE host is missing a security update. File : suse_phpMyAdmin-5781.nasl - Type : ACT_GATHER_INFO |
2008-05-09 | Name : The remote Gentoo host is missing one or more security-related patches. File : gentoo_GLSA-200805-02.nasl - Type : ACT_GATHER_INFO |
2008-04-28 | Name : The remote Debian host is missing a security-related update. File : debian_DSA-1557.nasl - Type : ACT_GATHER_INFO |
2008-04-28 | Name : The remote FreeBSD host is missing a security-related update. File : freebsd_pkg_6eb1dc51124411ddbab70016179b2dd5.nasl - Type : ACT_GATHER_INFO |
2008-04-28 | Name : The remote FreeBSD host is missing a security-related update. File : freebsd_pkg_fe971a0f124611ddbab70016179b2dd5.nasl - Type : ACT_GATHER_INFO |
2008-04-04 | Name : The remote Fedora host is missing a security update. File : fedora_2008-2825.nasl - Type : ACT_GATHER_INFO |
2008-04-04 | Name : The remote Fedora host is missing a security update. File : fedora_2008-2874.nasl - Type : ACT_GATHER_INFO |
2008-03-13 | Name : The remote Gentoo host is missing one or more security-related patches. File : gentoo_GLSA-200803-15.nasl - Type : ACT_GATHER_INFO |
2008-03-07 | Name : The remote Fedora host is missing a security update. File : fedora_2008-2189.nasl - Type : ACT_GATHER_INFO |
2008-03-07 | Name : The remote Fedora host is missing a security update. File : fedora_2008-2229.nasl - Type : ACT_GATHER_INFO |
2008-03-07 | Name : The remote FreeBSD host is missing a security-related update. File : freebsd_pkg_ce2f2adee7df11dca701000bcdc1757a.nasl - Type : ACT_GATHER_INFO |
Alert History
Date | Informations |
---|---|
2014-02-17 11:27:34 |
|