Executive Summary
Informations | |||
---|---|---|---|
Name | MDVSA-2013:160 | First vendor Publication | 2013-05-03 |
Vendor | Mandriva | Last vendor Modification | 2013-05-03 |
Severity (Vendor) | N/A | Revision | N/A |
Security-Database Scoring CVSS v3
Cvss vector : N/A | |||
---|---|---|---|
Overall CVSS Score | NA | ||
Base Score | NA | Environmental Score | NA |
impact SubScore | NA | Temporal Score | NA |
Exploitabality Sub Score | NA | ||
Calculate full CVSS 3.0 Vectors scores |
Security-Database Scoring CVSS v2
Cvss vector : (AV:N/AC:M/Au:S/C:P/I:P/A:P) | |||
---|---|---|---|
Cvss Base Score | 6 | Attack Range | Network |
Cvss Impact Score | 6.4 | Attack Complexity | Medium |
Cvss Expoit Score | 6.8 | Authentication | Requires single instance |
Calculate full CVSS 2.0 Vectors scores |
Detail
Updated phpmyadmin package fixes security vulnerabilities: In some PHP versions, the preg_replace\(\) function can be tricked into executing arbitrary PHP code on the server. This is done by passing a crafted argument as the regular expression, containing a null byte. phpMyAdmin does not correctly sanitize an argument passed to preg_replace\(\) when using the Replace table prefix feature, opening the way to this vulnerability (CVE-2013-3238). phpMyAdmin can be configured to save an export file on the web server, via its SaveDir directive. With this in place, it's possible, either via a crafted filename template or a crafted table name, to save a double extension file like foobar.php.sql. In turn, an Apache webserver on which there is no definition for the MIME type sql (the default) will treat this saved file as a .php script, leading to remote code execution (CVE-2013-3239). |
Original Source
Url : http://www.mandriva.com/security/advisories?name=MDVSA-2013:160 |
CWE : Common Weakness Enumeration
% | Id | Name |
---|---|---|
100 % | CWE-94 | Failure to Control Generation of Code ('Code Injection') |
CPE : Common Platform Enumeration
SAINT Exploits
Description | Link |
---|---|
phpMyAdmin preg_replace from_prefix sanitization vulnerability | More info here |
ExploitDB Exploits
id | Description |
---|---|
2013-04-25 | phpMyAdmin 3.5.8 and 4.0.0-RC2 - Multiple Vulnerabilities |
Snort® IPS/IDS
Date | Description |
---|---|
2014-01-10 | phpMyAdmin preg_replace remote code execution attempt RuleID : 26547 - Revision : 8 - Type : SERVER-WEBAPP |
Nessus® Vulnerability Scanner
Date | Description |
---|---|
2014-06-13 | Name : The remote openSUSE host is missing a security update. File : openSUSE-2013-524.nasl - Type : ACT_GATHER_INFO |
2013-11-05 | Name : The remote Gentoo host is missing one or more security-related patches. File : gentoo_GLSA-201311-02.nasl - Type : ACT_GATHER_INFO |
2013-05-10 | Name : The remote Fedora host is missing a security update. File : fedora_2013-6928.nasl - Type : ACT_GATHER_INFO |
2013-05-10 | Name : The remote Fedora host is missing a security update. File : fedora_2013-6977.nasl - Type : ACT_GATHER_INFO |
2013-05-10 | Name : The remote Fedora host is missing a security update. File : fedora_2013-7000.nasl - Type : ACT_GATHER_INFO |
2013-05-04 | Name : The remote Mandriva Linux host is missing a security update. File : mandriva_MDVSA-2013-160.nasl - Type : ACT_GATHER_INFO |
2013-05-02 | Name : The remote web server hosts a PHP application that is affected by multiple vu... File : phpmyadmin_pmasa_2013_2.nasl - Type : ACT_GATHER_INFO |
2013-04-25 | Name : The remote FreeBSD host is missing a security-related update. File : freebsd_pkg_8c8fa44dad1511e28cea6805ca0b3d42.nasl - Type : ACT_GATHER_INFO |
Alert History
Date | Informations |
---|---|
2014-02-17 11:43:48 |
|
2013-05-07 21:18:48 |
|