7.5 High
CVSS2
Access Vector
NETWORK
Access Complexity
LOW
Authentication
NONE
Confidentiality Impact
PARTIAL
Integrity Impact
PARTIAL
Availability Impact
PARTIAL
AV:N/AC:L/Au:N/C:P/I:P/A:P
0.806 High
EPSS
Percentile
98.3%
Announcement-ID: PMASA-2009-3
Date: 2009-03-24
Insufficient output sanitizing when generating configuration file.
Setup script used to generate configuration can be fooled using a crafted POST request to include arbitrary PHP code in generated configuration file. Combined with ability to save files on server, this can allow unauthenticated users to execute arbitrary PHP code.
We consider this vulnerability to be critical.
Additional steps from administrator are required to actually exploit this issue (web server writable config directory has to be created).
For 2.11.x: versions before 2.11.9.5.<br /> For 3.x: versions before 3.1.3.1.<br />
Upgrade to phpMyAdmin 2.11.9.5 or 3.1.3.1 or apply patch listed below.
Thanks to Greg Ose (Neohapsis), who has discovered this issue and reported it to us.
Assigned CVE ids: CVE-2009-1151
The following commits have been made to fix this issue:
The following commits have been made on the 2.11 branch to fix this issue:
For further information and in case of questions, please contact the phpMyAdmin team. Our website is phpmyadmin.net.
CPE | Name | Operator | Version |
---|---|---|---|
phpmyadmin | le | 3.1.3.1. | |
phpmyadmin | le | 2.11.9.5. |