|
Vulnerability Assessment & Network Security Forums |
|||||||||
If through a vulnerability assessment, a network security issue is detected for the vulnerability below, applying the appropriate security patches in a timely matter is very important. If you have detected that your system has already been compromised, following CERT's Network Security recovery document will assist with recommended steps for system recovery. Home >> Browse Vulnerability Assessment Database >> Gentoo Local Security Checks >> [GLSA-200412-19] phpMyAdmin: Multiple vulnerabilities Vulnerability Assessment Details
|
[GLSA-200412-19] phpMyAdmin: Multiple vulnerabilities |
||
phpMyAdmin: Multiple vulnerabilities Detailed Explanation for this Vulnerability Assessment The remote host is affected by the vulnerability described in GLSA-200412-19 (phpMyAdmin: Multiple vulnerabilities) Nicolas Gregoire (exaprobe.com) has discovered two vulnerabilities that exist only on a webserver where PHP safe_mode is off. These vulnerabilities could lead to command execution or file disclosure. Impact On a system where external MIME-based transformations are enabled, a possible hacker can insert offensive values in MySQL, which would start a shell when the data is browsed. On a system where the UploadDir is enabled, read_dump.php could use the unsanitized sql_localfile variable to disclose a file. Workaround You can temporarily enable PHP safe_mode or disable external MIME-based transformation AND disable the UploadDir. But instead, we strongly advise to update your version to 2.6.1_rc1. References: http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2004-1147 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2004-1148 http://www.phpmyadmin.net/home_page/security.php?issue=PMASA-2004-4 http://www.exaprobe.com/labs/advisories/esa-2004-1213.html Solution: All phpMyAdmin users should upgrade to the latest version: # emerge --sync # emerge --ask --oneshot --verbose ">=dev-db/phpmyadmin-2.6.1_rc1" Network Security Threat Level: High Networks Security ID: Vulnerability Assessment Copyright: (C) 2005 Michel Arboi |
||
Cables, Connectors |
HGST Ultrastar HE10 HUH721010ALE600 10TB SATA 6Gb/s 7200RPM 3.5" Enterprise HDD
$69.99
Western Digital WD60PURZ 6TB Hard Drive SATA6 Gb/s 64MB Cache 3.5 Inch
$109.99
WD4000FYYZ Western Digital 4TB SATA 3.5 Hard Drive
$149.99
WF12F DELL 1TB 7.2K 6GBPS SATA 2.5'' HDD HARD DRIVE ST91000640NS 0WF12F
$25.00
HGST Ultrastar DC HC520 12TB SATA 6Gb 256MB 3.5" Enterprise HDD- HUH721212ALE601
$82.99
Seagate Exos 7E10 ST2000NM000B 2TB 7200RPM SATA 6.0Gb/s 3.5" Internal Hard Drive
$29.99
2 PACK Seagate ST1000LM035 Mobile HDD 1TB 2.5" SATA III Laptop Hard Drive
$26.85
Western Digital WD5000LPLX 500GB 2.5" SATA 32MB 6Gb/s 7200RPM Laptop Hard Drive
$7.99
WD 16TB Elements Desktop, Certified Refurbished Hard Drive - RWDBWLG0160HBK-NESN
$174.99
HDD-T10T-SM0F27495 - Supermicro 10TB 7.2K 6G SATA 3.5" HDD HUH721010ALE604
$43.74
|
||
No Discussions have been posted on this vulnerability. |