Executive Summary



This Alert is flagged as TOP 25 Common Weakness Enumeration from CWE/SANS. For more information, you can read this.
Summary
Title Updated phpMyAdmin packages fix multiple vulnerabilities
Informations
Name MDVSA-2008:131 First vendor Publication 2008-07-04
Vendor Mandriva Last vendor Modification 2008-07-04
Severity (Vendor) N/A Revision N/A

Security-Database Scoring CVSS v3

Cvss vector : N/A
Overall CVSS Score NA
Base Score NA Environmental Score NA
impact SubScore NA Temporal Score NA
Exploitabality Sub Score NA
 
Calculate full CVSS 3.0 Vectors scores

Security-Database Scoring CVSS v2

Cvss vector : (AV:N/AC:H/Au:N/C:P/I:P/A:P)
Cvss Base Score 5.1 Attack Range Network
Cvss Impact Score 6.4 Attack Complexity High
Cvss Expoit Score 4.9 Authentication None Required
Calculate full CVSS 2.0 Vectors scores

Detail

A few vulnerabilities and security-related issues have been fixed in phpMyAdmin since the 2.11.2.2 release. This update provides version 2.11.7 which is the latest stable release of phpMyAdmin and fixes CVE-2008-1149, CVE-2008-1567, CVE-2008-1924, and CVE-2008-2960.

No configuration changes should be required since the previous update (version 2.11.2.2). If upgrading from older versions, it may be necessary to reconfigure phpMyAdmin. The configuration file is located in /etc/phpMyAdmin/. In most cases, it should be sufficient so simply replace config.default.php with config.default.php.rpmnew and make whatever modifications are necessary.

Original Source

Url : http://www.mandriva.com/security/advisories?name=MDVSA-2008:131

CAPEC : Common Attack Pattern Enumeration & Classification

Id Name
CAPEC-31 Accessing/Intercepting/Modifying HTTP Cookies
CAPEC-37 Lifting Data Embedded in Client Distributions
CAPEC-65 Passively Sniff and Capture Application Code Bound for Authorized Client
CAPEC-117 Data Interception Attacks
CAPEC-155 Screen Temporary Files for Sensitive Information
CAPEC-157 Sniffing Attacks
CAPEC-167 Lifting Sensitive Data from the Client
CAPEC-204 Lifting cached, sensitive data embedded in client distributions (thick or thin)
CAPEC-205 Lifting credential(s)/key material embedded in client distributions (thick or...
CAPEC-258 Passively Sniffing and Capturing Application Code Bound for an Authorized Cli...
CAPEC-259 Passively Sniffing and Capturing Application Code Bound for an Authorized Cli...
CAPEC-260 Passively Sniffing and Capturing Application Code Bound for an Authorized Cli...

CWE : Common Weakness Enumeration

% Id Name
20 % CWE-352 Cross-Site Request Forgery (CSRF) (CWE/SANS Top 25)
20 % CWE-312 Cleartext Storage of Sensitive Information
20 % CWE-200 Information Exposure
20 % CWE-89 Improper Sanitization of Special Elements used in an SQL Command ('SQL Injection') (CWE/SANS Top 25)
20 % CWE-79 Failure to Preserve Web Page Structure ('Cross-site Scripting') (CWE/SANS Top 25)

OVAL Definitions

Definition Id: oval:org.mitre.oval:def:18667
 
Oval ID: oval:org.mitre.oval:def:18667
Title: DSA-1557-1 phpmyadmin - several vulnerabilities
Description: Several remote vulnerabilities have been discovered in phpMyAdmin, an application to administrate MySQL over the WWW.
Family: unix Class: patch
Reference(s): DSA-1557-1
CVE-2008-1149
CVE-2008-1567
CVE-2008-1924
Version: 5
Platform(s): Debian GNU/Linux 4.0
Product(s): phpmyadmin
Definition Synopsis:
Definition Id: oval:org.mitre.oval:def:8041
 
Oval ID: oval:org.mitre.oval:def:8041
Title: DSA-1557 phpmyadmin -- insufficient input sanitising
Description: Several remote vulnerabilities have been discovered in phpMyAdmin, an application to administrate MySQL over the WWW. The Common Vulnerabilities and Exposures project identifies the following problems: Attackers with CREATE table permissions were allowed to read arbitrary files readable by the webserver via a crafted HTTP POST request. The PHP session data file stored the username and password of a logged in user, which in some setups can be read by a local user. Cross site scripting and SQL injection were possible by attackers that had permission to create cookies in the same cookie domain as phpMyAdmin runs in.
Family: unix Class: patch
Reference(s): DSA-1557
CVE-2008-1149
CVE-2008-1567
CVE-2008-1924
Version: 5
Platform(s): Debian GNU/Linux 4.0
Product(s): phpmyadmin
Definition Synopsis:

CPE : Common Platform Enumeration

TypeDescriptionCount
Application 180
Os 1
Os 2
Os 3

OpenVAS Exploits

Date Description
2009-02-16 Name : Fedora Update for phpMyAdmin FEDORA-2008-2825
File : nvt/gb_fedora_2008_2825_phpMyAdmin_fc8.nasl
2009-02-16 Name : Fedora Update for phpMyAdmin FEDORA-2008-2874
File : nvt/gb_fedora_2008_2874_phpMyAdmin_fc7.nasl
2009-02-02 Name : SuSE Security Summary SUSE-SR:2009:003
File : nvt/suse_sr_2009_003.nasl
2008-09-24 Name : Gentoo Security Advisory GLSA 200803-15 (phpmyadmin)
File : nvt/glsa_200803_15.nasl
2008-09-24 Name : Gentoo Security Advisory GLSA 200805-02 (phpmyadmin)
File : nvt/glsa_200805_02.nasl
2008-09-04 Name : FreeBSD Ports: phpmyadmin
File : nvt/freebsd_phpmyadmin6.nasl
2008-09-04 Name : FreeBSD Ports: phpmyadmin
File : nvt/freebsd_phpmyadmin7.nasl
2008-09-04 Name : FreeBSD Ports: phpmyadmin
File : nvt/freebsd_phpmyadmin8.nasl
2008-09-04 Name : FreeBSD Ports: phpmyadmin
File : nvt/freebsd_phpmyadmin9.nasl
2008-04-30 Name : Debian Security Advisory DSA 1557-1 (phpmyadmin)
File : nvt/deb_1557_1.nasl

Open Source Vulnerability Database (OSVDB)

Id Description
46511 phpMyAdmin /libraries Multiple Scripts Unspecified XSS

phpMyAdmin contains a flaw that allows a remote cross site scripting attack. This flaw exists because the application does not validate input passed via unspecified parameters to files in /libraries. This could allow a user to create a specially crafted URL that would execute arbitrary code in a user's browser within the trust relationship between the browser and the server, leading to a loss of integrity.
44577 phpMyAdmin Crafted HTTP Request UploadDir Parameter Arbitrary File Access

43908 phpMyAdmin Session Data Credential / Secret Key Disclosure

phpMyAdmin contains a flaw that may lead to an unauthorized information disclosure. The issue is triggered when a malicious user accesses session data, which will disclose MySQL username and password information resulting in a loss of confidentiality.
43051 phpMyAdmin Crafted Cookie $_REQUEST Superglobal Overwrite

Nessus® Vulnerability Scanner

Date Description
2009-07-21 Name : The remote openSUSE host is missing a security update.
File : suse_11_0_phpMyAdmin-090119.nasl - Type : ACT_GATHER_INFO
2009-01-22 Name : The remote openSUSE host is missing a security update.
File : suse_phpMyAdmin-5935.nasl - Type : ACT_GATHER_INFO
2008-11-18 Name : The remote openSUSE host is missing a security update.
File : suse_phpMyAdmin-5781.nasl - Type : ACT_GATHER_INFO
2008-07-02 Name : The remote FreeBSD host is missing a security-related update.
File : freebsd_pkg_e285a1f4456811ddae960030843d3802.nasl - Type : ACT_GATHER_INFO
2008-05-09 Name : The remote Gentoo host is missing one or more security-related patches.
File : gentoo_GLSA-200805-02.nasl - Type : ACT_GATHER_INFO
2008-04-28 Name : The remote Debian host is missing a security-related update.
File : debian_DSA-1557.nasl - Type : ACT_GATHER_INFO
2008-04-28 Name : The remote FreeBSD host is missing a security-related update.
File : freebsd_pkg_6eb1dc51124411ddbab70016179b2dd5.nasl - Type : ACT_GATHER_INFO
2008-04-28 Name : The remote FreeBSD host is missing a security-related update.
File : freebsd_pkg_fe971a0f124611ddbab70016179b2dd5.nasl - Type : ACT_GATHER_INFO
2008-04-04 Name : The remote Fedora host is missing a security update.
File : fedora_2008-2825.nasl - Type : ACT_GATHER_INFO
2008-04-04 Name : The remote Fedora host is missing a security update.
File : fedora_2008-2874.nasl - Type : ACT_GATHER_INFO
2008-03-13 Name : The remote Gentoo host is missing one or more security-related patches.
File : gentoo_GLSA-200803-15.nasl - Type : ACT_GATHER_INFO
2008-03-07 Name : The remote Fedora host is missing a security update.
File : fedora_2008-2189.nasl - Type : ACT_GATHER_INFO
2008-03-07 Name : The remote Fedora host is missing a security update.
File : fedora_2008-2229.nasl - Type : ACT_GATHER_INFO
2008-03-07 Name : The remote FreeBSD host is missing a security-related update.
File : freebsd_pkg_ce2f2adee7df11dca701000bcdc1757a.nasl - Type : ACT_GATHER_INFO