<<< Date Index >>>     <<< Thread Index >>>

[Full-Disclosure] [ GLSA 200412-19 ] phpMyAdmin: Multiple vulnerabilities



- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
Gentoo Linux Security Advisory                           GLSA 200412-19
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
                                            http://security.gentoo.org/
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -

  Severity: High
     Title: phpMyAdmin: Multiple vulnerabilities
      Date: December 19, 2004
      Bugs: #74303
        ID: 200412-19

- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -

Synopsis
========

phpMyAdmin contains multiple vulnerabilities which could lead to file
disclosure or command execution.

Background
==========

phpMyAdmin is a tool written in PHP intended to handle the
administration of MySQL databases from a web-browser.

Affected packages
=================

    -------------------------------------------------------------------
     Package            /   Vulnerable   /                  Unaffected
    -------------------------------------------------------------------
  1  dev-db/phpmyadmin      < 2.6.1_rc1                   >= 2.6.1_rc1

Description
===========

Nicolas Gregoire (exaprobe.com) has discovered two vulnerabilities that
exist only on a webserver where PHP safe_mode is off. These
vulnerabilities could lead to command execution or file disclosure.

Impact
======

On a system where external MIME-based transformations are enabled, an
attacker can insert offensive values in MySQL, which would start a
shell when the data is browsed. On a system where the UploadDir is
enabled, read_dump.php could use the unsanitized sql_localfile variable
to disclose a file.

Workaround
==========

You can temporarily enable PHP safe_mode or disable external MIME-based
transformation AND disable the UploadDir. But instead, we strongly
advise to update your version to 2.6.1_rc1.

Resolution
==========

All phpMyAdmin users should upgrade to the latest version:

    # emerge --sync
    # emerge --ask --oneshot --verbose ">=dev-db/phpmyadmin-2.6.1_rc1"

References
==========

  [ 1 ] CAN-2004-1147
        http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2004-1147
  [ 2 ] CAN-2004-1148
        http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2004-1148
  [ 3 ] PHPMyAdmin advisory: PMASA-2004-4
        http://www.phpmyadmin.net/home_page/security.php?issue=PMASA-2004-4
  [ 4 ] Exaprobe.com advisory: esa-2004-1213
        http://www.exaprobe.com/labs/advisories/esa-2004-1213.html

Availability
============

This GLSA and any updates to it are available for viewing at
the Gentoo Security Website:

  http://security.gentoo.org/glsa/glsa-200412-19.xml

Concerns?
=========

Security is a primary focus of Gentoo Linux and ensuring the
confidentiality and security of our users machines is of utmost
importance to us. Any security concerns should be addressed to
security@xxxxxxxxxx or alternatively, you may file a bug at
http://bugs.gentoo.org.

License
=======

Copyright 2004 Gentoo Foundation, Inc; referenced text
belongs to its owner(s).

The contents of this document are licensed under the
Creative Commons - Attribution / Share Alike license.

http://creativecommons.org/licenses/by-sa/2.0


This e-mail transmission contains information that is confidential and may be 
privileged.   It is intended only for the addressee(s) named above. If you 
receive this e-mail in error, please do not read, copy or disseminate it in any 
manner. If you are not the intended recipient, any disclosure, copying, 
distribution or use of the contents of this information is prohibited. Please 
reply to the message immediately by informing the sender that the message was 
misdirected. After replying, please erase it from your computer system. Your 
assistance in correcting this error is appreciated.

Attachment: pgpWxmbVSFqN1.pgp
Description: PGP signature

_______________________________________________
Full-Disclosure - We believe in it.
Charter: http://lists.netsys.com/full-disclosure-charter.html


This e-mail transmission contains information that is confidential and may be 
privileged.   It is intended only for the addressee(s) named above. If you 
receive this e-mail in error, please do not read, copy or disseminate it in any 
manner. If you are not the intended recipient, any disclosure, copying, 
distribution or use of the contents of this information is prohibited. Please 
reply to the message immediately by informing the sender that the message was 
misdirected. After replying, please erase it from your computer system. Your 
assistance in correcting this error is appreciated.