Executive Summary
Summary | |
---|---|
Title | New phppgadmin packages fix regression |
Informations | |||
---|---|---|---|
Name | DSA-1693 | First vendor Publication | 2008-12-27 |
Vendor | Debian | Last vendor Modification | 2009-01-21 |
Severity (Vendor) | N/A | Revision | 2 |
Security-Database Scoring CVSS v3
Cvss vector : N/A | |||
---|---|---|---|
Overall CVSS Score | NA | ||
Base Score | NA | Environmental Score | NA |
impact SubScore | NA | Temporal Score | NA |
Exploitabality Sub Score | NA | ||
Calculate full CVSS 3.0 Vectors scores |
Security-Database Scoring CVSS v2
Cvss vector : (AV:N/AC:M/Au:N/C:C/I:C/A:C) | |||
---|---|---|---|
Cvss Base Score | 9.3 | Attack Range | Network |
Cvss Impact Score | 10 | Attack Complexity | Medium |
Cvss Expoit Score | 8.6 | Authentication | None Required |
Calculate full CVSS 2.0 Vectors scores |
Detail
The security update for phpPgAdmin in DSA-1693-1 caused a regression in modifying table fields. This updates corrects that flaw. For reference the original advisory follows. Several remote vulnerabilities have been discovered in phpPgAdmin, a tool to administrate PostgreSQL database over the web. The Common Vulnerabilities and Exposures project identifies the following problems: CVE-2007-2865   Cross-site scripting vulnerability allows remote attackers to inject   arbitrary web script or HTML via the server parameter. CVE-2007-5728   Cross-site scripting vulnerability allows remote attackers to inject   arbitrary web script or HTML via PHP_SELF. CVE-2008-5587   Directory traversal vulnerability allows remote attackers to read   arbitrary files via _language parameter. For the stable distribution (etch), these problems have been fixed in version 4.0.1-3.1etch2. We recommend that you upgrade your phppgadmin package. |
Original Source
Url : http://www.debian.org/security/2009/dsa-1693 |
CWE : Common Weakness Enumeration
% | Id | Name |
---|---|---|
50 % | CWE-79 | Failure to Preserve Web Page Structure ('Cross-site Scripting') (CWE/SANS Top 25) |
50 % | CWE-22 | Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') (CWE/SANS Top 25) |
OVAL Definitions
Definition Id:Â oval:org.mitre.oval:def:19797 | |||
Oval ID: | oval:org.mitre.oval:def:19797 | ||
Title: | DSA-1693-1 phppgadmin - several vulnerabilities | ||
Description: | Several remote vulnerabilities have been discovered in phpPgAdmin, a tool to administrate PostgreSQL database over the web. | ||
Family: | unix | Class: | patch |
Reference(s): | DSA-1693-1 CVE-2007-2865 CVE-2007-5728 CVE-2008-5587 | Version: | 5 |
Platform(s): | Debian GNU/Linux 4.0 | Product(s): | phppgadmin |
Definition Synopsis: | |||
Definition Id:Â oval:org.mitre.oval:def:7719 | |||
Oval ID: | oval:org.mitre.oval:def:7719 | ||
Title: | DSA-1693 phppgadmin -- several vulnerabilities | ||
Description: | Several remote vulnerabilities have been discovered in phpPgAdmin, a tool to administrate PostgreSQL database over the web. The Common Vulnerabilities and Exposures project identifies the following problems: Cross-site scripting vulnerability allows remote attackers to inject arbitrary web script or HTML via the server parameter. Cross-site scripting vulnerability allows remote attackers to inject arbitrary web script or HTML via PHP_SELF. Directory traversal vulnerability allows remote attackers to read arbitrary files via _language parameter. For the stable distribution (etch), these problems have been fixed in version 4.0.1-3.1etch2. For the unstable distribution (sid), these problems have been fixed in version 4.2.1-1.1. We recommend that you upgrade your phppgadmin package. | ||
Family: | unix | Class: | patch |
Reference(s): | DSA-1693 CVE-2007-2865 CVE-2007-5728 CVE-2008-5587 | Version: | 3 |
Platform(s): | Debian GNU/Linux 4.0 | Product(s): | phppgadmin |
Definition Synopsis: | |||
CPE : Common Platform Enumeration
OpenVAS Exploits
Date | Description |
---|---|
2009-06-05 | Name : Ubuntu USN-698-3 (nagios2) File : nvt/ubuntu_698_3.nasl |
2009-03-20 | Name : FreeBSD Ports: phppgadmin File : nvt/freebsd_phppgadmin1.nasl |
2009-02-27 | Name : Fedora Update for phpPgAdmin FEDORA-2007-0469 File : nvt/gb_fedora_2007_0469_phpPgAdmin_fc7.nasl |
2009-02-18 | Name : SuSE Security Summary SUSE-SR:2009:004 File : nvt/suse_sr_2009_004.nasl |
2009-02-13 | Name : Fedora Update for phpPgAdmin FEDORA-2008-11564 File : nvt/gb_fedora_2008_11564_phpPgAdmin_fc10.nasl |
2009-02-13 | Name : Fedora Update for phpPgAdmin FEDORA-2008-11576 File : nvt/gb_fedora_2008_11576_phpPgAdmin_fc8.nasl |
2009-02-13 | Name : Fedora Update for phpPgAdmin FEDORA-2008-11602 File : nvt/gb_fedora_2008_11602_phpPgAdmin_fc9.nasl |
2008-12-29 | Name : Debian Security Advisory DSA 1693-1 (phppgadmin) File : nvt/deb_1693_1.nasl |
2008-09-04 | Name : FreeBSD Ports: phppgadmin File : nvt/freebsd_phppgadmin0.nasl |
Open Source Vulnerability Database (OSVDB)
Id | Description |
---|---|
50545 | phpPgAdmin index.php _language Parameter Traversal Local File Inclusion |
40432 | phpPgAdmin redirect.php url Parameter Remote File Inclusion phpPgAdmin contains a flaw that may allow a remote attacker to execute arbitrary commands or code. The issue is due to the 'redirect.php' script not properly sanitizing user input supplied to the 'url' parameter. This may allow an attacker to include a file from a third-party remote host that contains commands or code that will be executed by the vulnerable script with the same privileges as the web server. |
38138 | phpPgAdmin sqledit.php server Parameter XSS phpPgAdmin contains a flaw that allows a remote cross-site scripting (XSS) attack. This flaw exists because the application does not validate the 'server' parameter upon submission to the 'sqledit.php' script. This may allow a user to create a specially crafted URL that would execute arbitrary script code in a user's browser within the trust relationship between their browser and the server. |
36699 | phpPgAdmin redirect.php URL XSS |
Snort® IPS/IDS
Date | Description |
---|---|
2014-01-10 | script tag in POST parameters - likely cross-site scripting RuleID : 21782 - Revision : 9 - Type : INDICATOR-OBFUSCATION |
2014-01-10 | cross-site scripting attempt via form data attempt RuleID : 19645 - Revision : 13 - Type : SERVER-WEBAPP |
Nessus® Vulnerability Scanner
Date | Description |
---|---|
2014-06-13 | Name : The remote openSUSE host is missing a security update. File : openSUSE-2012-219.nasl - Type : ACT_GATHER_INFO |
2009-07-21 | Name : The remote openSUSE host is missing a security update. File : suse_11_0_phpPgAdmin-090205.nasl - Type : ACT_GATHER_INFO |
2009-07-21 | Name : The remote openSUSE host is missing a security update. File : suse_11_1_phpPgAdmin-090205.nasl - Type : ACT_GATHER_INFO |
2009-04-23 | Name : The remote Fedora host is missing a security update. File : fedora_2008-11564.nasl - Type : ACT_GATHER_INFO |
2009-03-17 | Name : The remote FreeBSD host is missing a security-related update. File : freebsd_pkg_4ce3c20b124b11dea9640030843d3802.nasl - Type : ACT_GATHER_INFO |
2009-02-13 | Name : The remote openSUSE host is missing a security update. File : suse_phpPgAdmin-5984.nasl - Type : ACT_GATHER_INFO |
2008-12-29 | Name : The remote Debian host is missing a security-related update. File : debian_DSA-1693.nasl - Type : ACT_GATHER_INFO |
2008-12-21 | Name : The remote Fedora host is missing a security update. File : fedora_2008-11576.nasl - Type : ACT_GATHER_INFO |
2008-12-21 | Name : The remote Fedora host is missing a security update. File : fedora_2008-11602.nasl - Type : ACT_GATHER_INFO |
2008-12-08 | Name : The remote web server contains a PHP application that is susceptible to a loc... File : phppgadmin_language_file_include.nasl - Type : ACT_ATTACK |
2008-01-08 | Name : The remote openSUSE host is missing a security update. File : suse_phpPgAdmin-4713.nasl - Type : ACT_GATHER_INFO |
2007-11-06 | Name : The remote Fedora host is missing a security update. File : fedora_2007-0469.nasl - Type : ACT_GATHER_INFO |
2007-06-05 | Name : The remote FreeBSD host is missing a security-related update. File : freebsd_pkg_3d0e724e129b11dc9f790016179b2dd5.nasl - Type : ACT_GATHER_INFO |
Alert History
Date | Informations |
---|---|
2014-02-17 11:28:05 |
|