phpMyAdmin 4.0 - 4.8.4 Arbitrary File Read Vulnerability (PMASA-2019-1) on Linu
Reporter | Title | Published | Views | Family All 33 |
---|---|---|---|---|
![]() | CVE-2019-6799 | 26 Jan 201917:29 | – | alpinelinux |
![]() | CVE-2019-6799 | 26 Jan 201917:00 | – | cvelist |
![]() | CVE-2019-6799 | 26 Jan 201917:29 | – | debiancve |
![]() | Debian DLA-1692-1 : phpmyadmin security update | 28 Feb 201900:00 | – | nessus |
![]() | openSUSE Security Update : phpMyAdmin (openSUSE-2019-194) | 19 Feb 201900:00 | – | nessus |
![]() | phpMyAdmin 4.x < 4.8.5 Multiple Vulnerabilities (PMASA-2019-1) (PMASA-2019-2) | 27 Mar 201900:00 | – | nessus |
![]() | phpMyAdmin 4.0 < 4.8.5 Multiple Vulnerabilities (PMASA-2019-1), (PMASA-2019-2) | 16 Jul 201900:00 | – | nessus |
![]() | Ubuntu 18.04 LTS : phpMyAdmin vulnerabilities (USN-4639-1) | 19 Nov 202000:00 | – | nessus |
![]() | phpmyadmin - security update | 27 Feb 201900:00 | – | osv |
![]() | CVE-2019-6799 | 26 Jan 201917:29 | – | osv |
Source | Link |
---|---|
phpmyadmin | www.phpmyadmin.net/security/PMASA-2019-1/ |
# SPDX-FileCopyrightText: 2019 Greenbone AG
# Some text descriptions might be excerpted from (a) referenced
# source(s), and are Copyright (C) by the respective right holder(s).
#
# SPDX-License-Identifier: GPL-2.0-only
if(description)
{
script_oid("1.3.6.1.4.1.25623.1.0.112500");
script_version("2024-02-13T05:06:26+0000");
script_tag(name:"last_modification", value:"2024-02-13 05:06:26 +0000 (Tue, 13 Feb 2024)");
script_tag(name:"creation_date", value:"2019-01-28 14:49:12 +0100 (Mon, 28 Jan 2019)");
script_tag(name:"cvss_base", value:"4.3");
script_tag(name:"cvss_base_vector", value:"AV:N/AC:M/Au:N/C:P/I:N/A:N");
script_tag(name:"severity_vector", value:"CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N");
script_tag(name:"severity_origin", value:"NVD");
script_tag(name:"severity_date", value:"2020-08-24 17:37:00 +0000 (Mon, 24 Aug 2020)");
script_cve_id("CVE-2019-6799");
script_name("phpMyAdmin 4.0 <= 4.8.4 Arbitrary File Read Vulnerability (PMASA-2019-1) - Linux");
script_category(ACT_GATHER_INFO);
script_copyright("Copyright (C) 2019 Greenbone AG");
script_family("Web application abuses");
script_dependencies("gb_phpmyadmin_http_detect.nasl", "os_detection.nasl");
script_mandatory_keys("phpMyAdmin/installed", "Host/runs_unixoide");
script_tag(name:"summary", value:"phpMyAdmin is prone to an arbitrary file read vulnerability.");
script_tag(name:"vuldetect", value:"Checks if a vulnerable version is present on the target host.");
script_tag(name:"insight", value:"When AllowArbitraryServer configuration set to true, with the use of
a rogue MySQL server, an attacker can read any file on the server that the web server's user can access.
phpMyadmin attempts to block the use of LOAD DATA INFILE, but due to a bug in PHP, this check is not honored.
Additionally, when using the 'mysql' extension, mysql.allow_local_infile is enabled by default.
Both of these conditions allow the attack to occur.");
script_tag(name:"affected", value:"phpMyAdmin versions 4.0 through 4.8.4.");
script_tag(name:"solution", value:"Update to version 4.8.5.");
script_tag(name:"qod_type", value:"remote_banner_unreliable");
script_tag(name:"solution_type", value:"VendorFix");
script_xref(name:"URL", value:"https://www.phpmyadmin.net/security/PMASA-2019-1/");
exit(0);
}
CPE = "cpe:/a:phpmyadmin:phpmyadmin";
include("host_details.inc");
include("version_func.inc");
if( ! port = get_app_port( cpe:CPE ) )
exit( 0 );
if( ! infos = get_app_version_and_location( cpe:CPE, port:port, exit_no_version:TRUE ) )
exit( 0 );
vers = infos["version"];
path = infos["location"];
if( version_in_range( version:vers, test_version:"4.0", test_version2:"4.8.4" ) ) {
report = report_fixed_ver( installed_version:vers, fixed_version:"4.8.5", install_path:path );
security_message( data:report, port:port );
exit( 0 );
}
exit( 99 );
Transform Your Security Services
Elevate your offerings with Vulners' advanced Vulnerability Intelligence. Contact us for a demo and discover the difference comprehensive, actionable intelligence can make in your security strategy.
Book a live demo