Executive Summary
Summary | |
---|---|
Title | Updated phpMyAdmin packages fix multiple vulnerabilities |
Informations | |||
---|---|---|---|
Name | MDVSA-2008:131 | First vendor Publication | 2008-07-04 |
Vendor | Mandriva | Last vendor Modification | 2008-07-04 |
Severity (Vendor) | N/A | Revision | N/A |
Security-Database Scoring CVSS v3
Cvss vector : N/A | |||
---|---|---|---|
Overall CVSS Score | NA | ||
Base Score | NA | Environmental Score | NA |
impact SubScore | NA | Temporal Score | NA |
Exploitabality Sub Score | NA | ||
Calculate full CVSS 3.0 Vectors scores |
Security-Database Scoring CVSS v2
Cvss vector : (AV:N/AC:H/Au:N/C:P/I:P/A:P) | |||
---|---|---|---|
Cvss Base Score | 5.1 | Attack Range | Network |
Cvss Impact Score | 6.4 | Attack Complexity | High |
Cvss Expoit Score | 4.9 | Authentication | None Required |
Calculate full CVSS 2.0 Vectors scores |
Detail
A few vulnerabilities and security-related issues have been fixed in phpMyAdmin since the 2.11.2.2 release. This update provides version 2.11.7 which is the latest stable release of phpMyAdmin and fixes CVE-2008-1149, CVE-2008-1567, CVE-2008-1924, and CVE-2008-2960. No configuration changes should be required since the previous update (version 2.11.2.2). If upgrading from older versions, it may be necessary to reconfigure phpMyAdmin. The configuration file is located in /etc/phpMyAdmin/. In most cases, it should be sufficient so simply replace config.default.php with config.default.php.rpmnew and make whatever modifications are necessary. |
Original Source
Url : http://www.mandriva.com/security/advisories?name=MDVSA-2008:131 |
CAPEC : Common Attack Pattern Enumeration & Classification
Id | Name |
---|---|
CAPEC-31 | Accessing/Intercepting/Modifying HTTP Cookies |
CAPEC-37 | Lifting Data Embedded in Client Distributions |
CAPEC-65 | Passively Sniff and Capture Application Code Bound for Authorized Client |
CAPEC-117 | Data Interception Attacks |
CAPEC-155 | Screen Temporary Files for Sensitive Information |
CAPEC-157 | Sniffing Attacks |
CAPEC-167 | Lifting Sensitive Data from the Client |
CAPEC-204 | Lifting cached, sensitive data embedded in client distributions (thick or thin) |
CAPEC-205 | Lifting credential(s)/key material embedded in client distributions (thick or... |
CAPEC-258 | Passively Sniffing and Capturing Application Code Bound for an Authorized Cli... |
CAPEC-259 | Passively Sniffing and Capturing Application Code Bound for an Authorized Cli... |
CAPEC-260 | Passively Sniffing and Capturing Application Code Bound for an Authorized Cli... |
CWE : Common Weakness Enumeration
% | Id | Name |
---|---|---|
20 % | CWE-352 | Cross-Site Request Forgery (CSRF) (CWE/SANS Top 25) |
20 % | CWE-312 | Cleartext Storage of Sensitive Information |
20 % | CWE-200 | Information Exposure |
20 % | CWE-89 | Improper Sanitization of Special Elements used in an SQL Command ('SQL Injection') (CWE/SANS Top 25) |
20 % | CWE-79 | Failure to Preserve Web Page Structure ('Cross-site Scripting') (CWE/SANS Top 25) |
OVAL Definitions
Definition Id: oval:org.mitre.oval:def:18667 | |||
Oval ID: | oval:org.mitre.oval:def:18667 | ||
Title: | DSA-1557-1 phpmyadmin - several vulnerabilities | ||
Description: | Several remote vulnerabilities have been discovered in phpMyAdmin, an application to administrate MySQL over the WWW. | ||
Family: | unix | Class: | patch |
Reference(s): | DSA-1557-1 CVE-2008-1149 CVE-2008-1567 CVE-2008-1924 | Version: | 5 |
Platform(s): | Debian GNU/Linux 4.0 | Product(s): | phpmyadmin |
Definition Synopsis: | |||
Definition Id: oval:org.mitre.oval:def:8041 | |||
Oval ID: | oval:org.mitre.oval:def:8041 | ||
Title: | DSA-1557 phpmyadmin -- insufficient input sanitising | ||
Description: | Several remote vulnerabilities have been discovered in phpMyAdmin, an application to administrate MySQL over the WWW. The Common Vulnerabilities and Exposures project identifies the following problems: Attackers with CREATE table permissions were allowed to read arbitrary files readable by the webserver via a crafted HTTP POST request. The PHP session data file stored the username and password of a logged in user, which in some setups can be read by a local user. Cross site scripting and SQL injection were possible by attackers that had permission to create cookies in the same cookie domain as phpMyAdmin runs in. | ||
Family: | unix | Class: | patch |
Reference(s): | DSA-1557 CVE-2008-1149 CVE-2008-1567 CVE-2008-1924 | Version: | 5 |
Platform(s): | Debian GNU/Linux 4.0 | Product(s): | phpmyadmin |
Definition Synopsis: | |||
CPE : Common Platform Enumeration
OpenVAS Exploits
Date | Description |
---|---|
2009-02-16 | Name : Fedora Update for phpMyAdmin FEDORA-2008-2825 File : nvt/gb_fedora_2008_2825_phpMyAdmin_fc8.nasl |
2009-02-16 | Name : Fedora Update for phpMyAdmin FEDORA-2008-2874 File : nvt/gb_fedora_2008_2874_phpMyAdmin_fc7.nasl |
2009-02-02 | Name : SuSE Security Summary SUSE-SR:2009:003 File : nvt/suse_sr_2009_003.nasl |
2008-09-24 | Name : Gentoo Security Advisory GLSA 200803-15 (phpmyadmin) File : nvt/glsa_200803_15.nasl |
2008-09-24 | Name : Gentoo Security Advisory GLSA 200805-02 (phpmyadmin) File : nvt/glsa_200805_02.nasl |
2008-09-04 | Name : FreeBSD Ports: phpmyadmin File : nvt/freebsd_phpmyadmin6.nasl |
2008-09-04 | Name : FreeBSD Ports: phpmyadmin File : nvt/freebsd_phpmyadmin7.nasl |
2008-09-04 | Name : FreeBSD Ports: phpmyadmin File : nvt/freebsd_phpmyadmin8.nasl |
2008-09-04 | Name : FreeBSD Ports: phpmyadmin File : nvt/freebsd_phpmyadmin9.nasl |
2008-04-30 | Name : Debian Security Advisory DSA 1557-1 (phpmyadmin) File : nvt/deb_1557_1.nasl |
Open Source Vulnerability Database (OSVDB)
Id | Description |
---|---|
46511 | phpMyAdmin /libraries Multiple Scripts Unspecified XSS phpMyAdmin contains a flaw that allows a remote cross site scripting attack. This flaw exists because the application does not validate input passed via unspecified parameters to files in /libraries. This could allow a user to create a specially crafted URL that would execute arbitrary code in a user's browser within the trust relationship between the browser and the server, leading to a loss of integrity. |
44577 | phpMyAdmin Crafted HTTP Request UploadDir Parameter Arbitrary File Access |
43908 | phpMyAdmin Session Data Credential / Secret Key Disclosure phpMyAdmin contains a flaw that may lead to an unauthorized information disclosure. The issue is triggered when a malicious user accesses session data, which will disclose MySQL username and password information resulting in a loss of confidentiality. |
43051 | phpMyAdmin Crafted Cookie $_REQUEST Superglobal Overwrite |
Nessus® Vulnerability Scanner
Date | Description |
---|---|
2009-07-21 | Name : The remote openSUSE host is missing a security update. File : suse_11_0_phpMyAdmin-090119.nasl - Type : ACT_GATHER_INFO |
2009-01-22 | Name : The remote openSUSE host is missing a security update. File : suse_phpMyAdmin-5935.nasl - Type : ACT_GATHER_INFO |
2008-11-18 | Name : The remote openSUSE host is missing a security update. File : suse_phpMyAdmin-5781.nasl - Type : ACT_GATHER_INFO |
2008-07-02 | Name : The remote FreeBSD host is missing a security-related update. File : freebsd_pkg_e285a1f4456811ddae960030843d3802.nasl - Type : ACT_GATHER_INFO |
2008-05-09 | Name : The remote Gentoo host is missing one or more security-related patches. File : gentoo_GLSA-200805-02.nasl - Type : ACT_GATHER_INFO |
2008-04-28 | Name : The remote Debian host is missing a security-related update. File : debian_DSA-1557.nasl - Type : ACT_GATHER_INFO |
2008-04-28 | Name : The remote FreeBSD host is missing a security-related update. File : freebsd_pkg_6eb1dc51124411ddbab70016179b2dd5.nasl - Type : ACT_GATHER_INFO |
2008-04-28 | Name : The remote FreeBSD host is missing a security-related update. File : freebsd_pkg_fe971a0f124611ddbab70016179b2dd5.nasl - Type : ACT_GATHER_INFO |
2008-04-04 | Name : The remote Fedora host is missing a security update. File : fedora_2008-2825.nasl - Type : ACT_GATHER_INFO |
2008-04-04 | Name : The remote Fedora host is missing a security update. File : fedora_2008-2874.nasl - Type : ACT_GATHER_INFO |
2008-03-13 | Name : The remote Gentoo host is missing one or more security-related patches. File : gentoo_GLSA-200803-15.nasl - Type : ACT_GATHER_INFO |
2008-03-07 | Name : The remote Fedora host is missing a security update. File : fedora_2008-2189.nasl - Type : ACT_GATHER_INFO |
2008-03-07 | Name : The remote Fedora host is missing a security update. File : fedora_2008-2229.nasl - Type : ACT_GATHER_INFO |
2008-03-07 | Name : The remote FreeBSD host is missing a security-related update. File : freebsd_pkg_ce2f2adee7df11dca701000bcdc1757a.nasl - Type : ACT_GATHER_INFO |