Lucene search

K
phpmyadminPhpMyAdminPHPMYADMIN:PMASA-2011-6
HistoryJul 02, 2011 - 12:00 a.m.

Possible code injection in setup script in case session variables are compromised.

2011-07-0200:00:00
www.phpmyadmin.net
21

7.5 High

CVSS2

Access Vector

NETWORK

Access Complexity

LOW

Authentication

NONE

Confidentiality Impact

PARTIAL

Integrity Impact

PARTIAL

Availability Impact

PARTIAL

AV:N/AC:L/Au:N/C:P/I:P/A:P

0.199 Low

EPSS

Percentile

96.3%

PMASA-2011-6

Announcement-ID: PMASA-2011-6

Date: 2011-07-02

Summary

Possible code injection in setup script in case session variables are compromised.

Description

An unsanitized key from the Servers array is written in a comment of the generated config. An attacker can modify this key by modifying the SESSION superglobal array. This allows the attacker to close the comment and inject code.

Severity

We consider this vulnerability to be non critical.

Affected Versions

The 3.4.3 and earlier versions are affected.

Unaffected Versions

Branch 2.11.x is not affected by this.

Solution

Upgrade to phpMyAdmin 3.3.10.2 or 3.4.3.1 or apply the related patch listed below.

References

This issue was found by Frans Pehrson from Xxor AB. His advisory.

Assigned CVE ids: CVE-2011-2506

CWE ids: CWE-661 CWE-116

Patches

The following commits have been made to fix this issue:

The following commits have been made on the 3.3 branch to fix this issue:

More information

For further information and in case of questions, please contact the phpMyAdmin team. Our website is phpmyadmin.net.

CPENameOperatorVersion
phpmyadminle3.4.3

7.5 High

CVSS2

Access Vector

NETWORK

Access Complexity

LOW

Authentication

NONE

Confidentiality Impact

PARTIAL

Integrity Impact

PARTIAL

Availability Impact

PARTIAL

AV:N/AC:L/Au:N/C:P/I:P/A:P

0.199 Low

EPSS

Percentile

96.3%