CVSS2
Attack Vector
NETWORK
Attack Complexity
MEDIUM
Authentication
NONE
Confidentiality Impact
NONE
Integrity Impact
PARTIAL
Availability Impact
NONE
AV:N/AC:M/Au:N/C:N/I:P/A:N
EPSS
Percentile
70.5%
Changes for 3.4.4.0 (2011-08-24) :
[parser] SQL parser breaks AJAX requests if query has unclosed quotes
[parser] Invalid escape sequence in SQL parser
[config] $cfg[βExportβ][βasfileβ] set to false does not select as Text option
[export] Working SQL query exports error page
[interface] βCreate an index on X columnsβ form not validated
[interface] JS error in Table->Structure->Index->Edit
[interface] Info message has βerrorβ class
[interface] TABbing through a NULL field in the inline mode resets NULL
[various] remove version number in /setup
[usability] Missing βGenerate Passwordβ button
[display] Missing Server Parameter on inline sql query
[navi] Drop field -> lost active table
[various] remove misleading comment on the βRename databaseβ interface
[interface] Fix footnote for inexact count while browsing
[interface] Fix security warning link in setup
[display] Backquotes in normal text on import page
[core] With Suhosin, urls are too long in edit links
[security] Missing sanitization on the table, column and index names leads to XSS vulnerabilities, see PMASA-2011-13 (http://www.phpmyadmin.net/home_page/security/PMASA-20 11-13.php)
Note that Tenable Network Security has extracted the preceding description block directly from the Fedora security advisory. Tenable has attempted to automatically clean and format it as much as possible without introducing additional issues.
#%NASL_MIN_LEVEL 70300
#
# (C) Tenable Network Security, Inc.
#
# The descriptive text and package checks in this plugin were
# extracted from Fedora Security Advisory 2011-11630.
#
include('deprecated_nasl_level.inc');
include('compat.inc');
if (description)
{
script_id(56183);
script_version("1.9");
script_set_attribute(attribute:"plugin_modification_date", value:"2021/01/11");
script_cve_id("CVE-2011-3181");
script_xref(name:"FEDORA", value:"2011-11630");
script_name(english:"Fedora 15 : phpMyAdmin-3.4.4-1.fc15 (2011-11630)");
script_summary(english:"Checks rpm output for the updated package.");
script_set_attribute(
attribute:"synopsis",
value:"The remote Fedora host is missing a security update."
);
script_set_attribute(
attribute:"description",
value:
"Changes for 3.4.4.0 (2011-08-24) :
- [parser] SQL parser breaks AJAX requests if query has
unclosed quotes
- [parser] Invalid escape sequence in SQL parser
- [config] $cfg['Export']['asfile'] set to false does
not select as Text option
- [export] Working SQL query exports error page
- [interface] 'Create an index on X columns' form not
validated
- [interface] JS error in Table->Structure->Index->Edit
- [interface] Info message has 'error' class
- [interface] TABbing through a NULL field in the inline
mode resets NULL
- [various] remove version number in /setup
- [usability] Missing 'Generate Password' button
- [display] Missing Server Parameter on inline sql query
- [navi] Drop field -> lost active table
- [various] remove misleading comment on the 'Rename
database' interface
- [interface] Fix footnote for inexact count while
browsing
- [interface] Fix security warning link in setup
- [display] Backquotes in normal text on import page
- [core] With Suhosin, urls are too long in edit links
- [security] Missing sanitization on the table, column
and index names leads to XSS vulnerabilities, see
PMASA-2011-13
(http://www.phpmyadmin.net/home_page/security/PMASA-20
11-13.php)
Note that Tenable Network Security has extracted the preceding
description block directly from the Fedora security advisory. Tenable
has attempted to automatically clean and format it as much as possible
without introducing additional issues."
);
# http://www.phpmyadmin.net/home_page/security/PMASA-2011-13.php
script_set_attribute(
attribute:"see_also",
value:"https://www.phpmyadmin.net/security/PMASA-2011-13/"
);
script_set_attribute(
attribute:"see_also",
value:"https://bugzilla.redhat.com/show_bug.cgi?id=733475"
);
# https://lists.fedoraproject.org/pipermail/package-announce/2011-September/065829.html
script_set_attribute(
attribute:"see_also",
value:"http://www.nessus.org/u?d787e788"
);
script_set_attribute(
attribute:"solution",
value:"Update the affected phpMyAdmin package."
);
script_set_cvss_base_vector("CVSS2#AV:N/AC:M/Au:N/C:N/I:P/A:N");
script_set_attribute(attribute:"plugin_type", value:"local");
script_set_attribute(attribute:"cpe", value:"p-cpe:/a:fedoraproject:fedora:phpMyAdmin");
script_set_attribute(attribute:"cpe", value:"cpe:/o:fedoraproject:fedora:15");
script_set_attribute(attribute:"patch_publication_date", value:"2011/08/26");
script_set_attribute(attribute:"plugin_publication_date", value:"2011/09/14");
script_end_attributes();
script_category(ACT_GATHER_INFO);
script_copyright(english:"This script is Copyright (C) 2011-2021 and is owned by Tenable, Inc. or an Affiliate thereof.");
script_family(english:"Fedora Local Security Checks");
script_dependencies("ssh_get_info.nasl");
script_require_keys("Host/local_checks_enabled", "Host/RedHat/release", "Host/RedHat/rpm-list");
exit(0);
}
include("audit.inc");
include("global_settings.inc");
include("rpm.inc");
if (!get_kb_item("Host/local_checks_enabled")) audit(AUDIT_LOCAL_CHECKS_NOT_ENABLED);
release = get_kb_item("Host/RedHat/release");
if (isnull(release) || "Fedora" >!< release) audit(AUDIT_OS_NOT, "Fedora");
os_ver = eregmatch(pattern: "Fedora.*release ([0-9]+)", string:release);
if (isnull(os_ver)) audit(AUDIT_UNKNOWN_APP_VER, "Fedora");
os_ver = os_ver[1];
if (! ereg(pattern:"^15([^0-9]|$)", string:os_ver)) audit(AUDIT_OS_NOT, "Fedora 15.x", "Fedora " + os_ver);
if (!get_kb_item("Host/RedHat/rpm-list")) audit(AUDIT_PACKAGE_LIST_MISSING);
cpu = get_kb_item("Host/cpu");
if (isnull(cpu)) audit(AUDIT_UNKNOWN_ARCH);
if ("x86_64" >!< cpu && cpu !~ "^i[3-6]86$") audit(AUDIT_LOCAL_CHECKS_NOT_IMPLEMENTED, "Fedora", cpu);
flag = 0;
if (rpm_check(release:"FC15", reference:"phpMyAdmin-3.4.4-1.fc15")) flag++;
if (flag)
{
if (report_verbosity > 0) security_warning(port:0, extra:rpm_report_get());
else security_warning(0);
exit(0);
}
else
{
tested = pkg_tests_get();
if (tested) audit(AUDIT_PACKAGE_NOT_AFFECTED, tested);
else audit(AUDIT_PACKAGE_NOT_INSTALLED, "phpMyAdmin");
}