Vulnerability Assessment & Network Security Forums



If through a vulnerability assessment, a network security issue is detected for the vulnerability below, applying the appropriate security patches in a timely matter is very important.  If you have detected that your system has already been compromised, following CERT's Network Security recovery document will assist with recommended steps for system recovery.


Home >> Browse Vulnerability Assessment Database >> Gentoo Local Security Checks >> [GLSA-200412-19] phpMyAdmin: Multiple vulnerabilities


Vulnerability Assessment Details

[GLSA-200412-19] phpMyAdmin: Multiple vulnerabilities

Vulnerability Assessment Summary
phpMyAdmin: Multiple vulnerabilities

Detailed Explanation for this Vulnerability Assessment
The remote host is affected by the vulnerability described in GLSA-200412-19
(phpMyAdmin: Multiple vulnerabilities)


Nicolas Gregoire (exaprobe.com) has discovered two vulnerabilities
that exist only on a webserver where PHP safe_mode is off. These
vulnerabilities could lead to command execution or file disclosure.

Impact

On a system where external MIME-based transformations are enabled,
a possible hacker can insert offensive values in MySQL, which would start a
shell when the data is browsed. On a system where the UploadDir is
enabled, read_dump.php could use the unsanitized sql_localfile variable
to disclose a file.

Workaround

You can temporarily enable PHP safe_mode or disable external
MIME-based transformation AND disable the UploadDir. But instead, we
strongly advise to update your version to 2.6.1_rc1.

References:
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2004-1147
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2004-1148
http://www.phpmyadmin.net/home_page/security.php?issue=PMASA-2004-4
http://www.exaprobe.com/labs/advisories/esa-2004-1213.html


Solution:
All phpMyAdmin users should upgrade to the latest version:
# emerge --sync
# emerge --ask --oneshot --verbose ">=dev-db/phpmyadmin-2.6.1_rc1"


Network Security Threat Level: High


Networks Security ID:

Vulnerability Assessment Copyright: (C) 2005 Michel Arboi

Cables, Connectors

Juniper Networks EX4200-48PX 48-Port PoE Gigabit Switch (750-034195 REV 31)
$129.99
Juniper Networks EX4200-48PX 48-Port PoE Gigabit Switch (750-034195 REV 31) pictureLot of 2 Juniper EX4200-48 1x48PX 1x48P 48Port Gigabit PoE+ switches
$220.0
Lot of 2 Juniper EX4200-48 1x48PX 1x48P  48Port Gigabit PoE+ switches pictureGenuine Juniper Networks SA 2500 Secure Access System SSL VPN Security Appliance
$49.99
Genuine Juniper Networks SA 2500 Secure Access System SSL VPN Security Appliance pictureJuniper Networks EX4200-48PX 48-Port PoE Gigabit Switch (750-034195 REV 31)
$109.99
Juniper Networks EX4200-48PX 48-Port PoE Gigabit Switch (750-034195 REV 31) picture


Discussions

No Discussions have been posted on this vulnerability.