Lucene search

K
gentooGentoo FoundationGLSA-200906-03
HistoryJun 29, 2009 - 12:00 a.m.

phpMyAdmin: Multiple vulnerabilities

2009-06-2900:00:00
Gentoo Foundation
security.gentoo.org
19

7.5 High

CVSS2

Access Vector

NETWORK

Access Complexity

LOW

Authentication

NONE

Confidentiality Impact

PARTIAL

Integrity Impact

PARTIAL

Availability Impact

PARTIAL

AV:N/AC:L/Au:N/C:P/I:P/A:P

0.806 High

EPSS

Percentile

98.3%

Background

phpMyAdmin is a web-based management tool for MySQL databases.

Description

Multiple vulnerabilities have been reported in phpMyAdmin:

  • Greg Ose discovered that the setup script does not sanitize input properly, leading to the injection of arbitrary PHP code into the configuration file (CVE-2009-1151).
  • Manuel Lopez Gallego and Santiago Rodriguez Collazo reported that data from cookies used in the โ€œExportโ€ page is not properly sanitized (CVE-2009-1150).

Impact

A remote unauthorized attacker could exploit the first vulnerability to execute arbitrary code with the privileges of the user running phpMyAdmin and conduct Cross-Site Scripting attacks using the second vulnerability.

Workaround

Removing the โ€œscripts/setup.phpโ€ file protects you from CVE-2009-1151.

Resolution

All phpMyAdmin users should upgrade to the latest version:

 # emerge --sync
 # emerge --ask --oneshot --verbose ">=dev-db/phpmyadmin-2.11.9.5"
OSVersionArchitecturePackageVersionFilename
Gentooanyalldev-db/phpmyadmin<ย 2.11.9.5UNKNOWN

7.5 High

CVSS2

Access Vector

NETWORK

Access Complexity

LOW

Authentication

NONE

Confidentiality Impact

PARTIAL

Integrity Impact

PARTIAL

Availability Impact

PARTIAL

AV:N/AC:L/Au:N/C:P/I:P/A:P

0.806 High

EPSS

Percentile

98.3%