Vulnerability Assessment & Network Security Forums



If through a vulnerability assessment, a network security issue is detected for the vulnerability below, applying the appropriate security patches in a timely matter is very important.  If you have detected that your system has already been compromised, following CERT's Network Security recovery document will assist with recommended steps for system recovery.


Home >> Browse Vulnerability Assessment Database >> Gentoo Local Security Checks >> [GLSA-200407-22] phpMyAdmin: Multiple vulnerabilities


Vulnerability Assessment Details

[GLSA-200407-22] phpMyAdmin: Multiple vulnerabilities

Vulnerability Assessment Summary
phpMyAdmin: Multiple vulnerabilities

Detailed Explanation for this Vulnerability Assessment
The remote host is affected by the vulnerability described in GLSA-200407-22
(phpMyAdmin: Multiple vulnerabilities)


Two serious vulnerabilities exist in phpMyAdmin. The first permits any user
to alter the server configuration variables (including host, name, and
password) by appending new settings to the array variables that hold the
configuration in a GET statement. The second permits users to include
arbitrary PHP code to be executed within an eval() statement in table name
configuration settings. This second vulnerability is only exploitable if
$cfg['LeftFrameLight'] is set to FALSE.

Impact

Authenticated users can alter configuration variables for their running
copy of phpMyAdmin. The impact of this should be minimal. However, the
second vulnerability would permit an authenticated user to execute arbitrary
PHP code with the permissions of the webserver, potentially permiting a
serious Denial of Service or further remote compromise.

Workaround

The second, more serious vulnerability is only exploitable if
$cfg['LeftFrameLight'] is set to FALSE. In the default Gentoo installation,
this is set to TRUE. There is no known workaround for the first.

References:
http://www.securityfocus.com/archive/1/367486


Solution:
All phpMyAdmin users should upgrade to the latest version:
# emerge sync
# emerge -pv ">=dev-db/phpmyadmin-2.5.7_p1"
# emerge ">=dev-db/phpmyadmin-2.5.7_p1"


Network Security Threat Level: Medium


Networks Security ID:

Vulnerability Assessment Copyright: (C) 2005 Michel Arboi

Cables, Connectors


Supermicro 4U 36 Bay Storage Server 2.4Ghz 8-C 128GB 1x1280W Rails TrueNAS ZFS picture

Supermicro 4U 36 Bay Storage Server 2.4Ghz 8-C 128GB 1x1280W Rails TrueNAS ZFS

$712.98



Dell R730xd 12LFF 2.6Ghz 20-C 128GB H730 2x10G+2x1G NIC 2x1100W 12x Trays Rails picture

Dell R730xd 12LFF 2.6Ghz 20-C 128GB H730 2x10G+2x1G NIC 2x1100W 12x Trays Rails

$721.05



Dell PowerEdge R630 8SFF 2.6Ghz 20-Core 128GB Mem 2x10G+2x1G NIC 2x750W PSU picture

Dell PowerEdge R630 8SFF 2.6Ghz 20-Core 128GB Mem 2x10G+2x1G NIC 2x750W PSU

$399.04



Dell Poweredge R640 Server | 2x Xeon Gold 6132 | 128GB | H730P | 8x HDD Trays picture

Dell Poweredge R640 Server | 2x Xeon Gold 6132 | 128GB | H730P | 8x HDD Trays

$1849.00



Intel Xeon E5-2697A V4 2.6GHz CPU Processor 16-Core Socket LGA2011 SR2K1 picture

Intel Xeon E5-2697A V4 2.6GHz CPU Processor 16-Core Socket LGA2011 SR2K1

$39.99



Intel Xeon E5-2680 v4 2.4GHz 35MB 14-Core 120W LGA2011-3 SR2N7 picture

Intel Xeon E5-2680 v4 2.4GHz 35MB 14-Core 120W LGA2011-3 SR2N7

$17.99



Intel Xeon Gold 6140 SR3AX 2.3GHz 18-Core Processor CPU picture

Intel Xeon Gold 6140 SR3AX 2.3GHz 18-Core Processor CPU

$39.99



Intel Xeon E5-2699v4 SR2JS 2.2GHz 22-Core 55MB 145W Server Processor CPU picture

Intel Xeon E5-2699v4 SR2JS 2.2GHz 22-Core 55MB 145W Server Processor CPU

$144.95



HP Workstation Z640 2x Xeon E5-2623V4 32GB Ram Dual 256GB SSD K420 Linux GA picture

HP Workstation Z640 2x Xeon E5-2623V4 32GB Ram Dual 256GB SSD K420 Linux GA

$234.98



Rare WaterCooled HP Z800 Workstation Dual Xeon X5680 16GB RAM 120GB SSD Nvidia picture

Rare WaterCooled HP Z800 Workstation Dual Xeon X5680 16GB RAM 120GB SSD Nvidia

$279.56



Discussions

No Discussions have been posted on this vulnerability.