Lucene search

K
freebsdFreeBSD7E4E5C53-A56C-11E0-B180-00216AA06FC2
HistoryJul 02, 2011 - 12:00 a.m.

phpmyadmin -- multiple vulnerabilities

2011-07-0200:00:00
vuxml.freebsd.org
28

CVSS2

7.5

Attack Vector

NETWORK

Attack Complexity

LOW

Authentication

NONE

Confidentiality Impact

PARTIAL

Integrity Impact

PARTIAL

Availability Impact

PARTIAL

AV:N/AC:L/Au:N/C:P/I:P/A:P

EPSS

0.22

Percentile

96.5%

The phpMyAdmin development team reports:

It was possible to manipulate the PHP session superglobal using
some of the Swekey authentication code. This could open a path
for other attacks.

An unsanitized key from the Servers array is written in a comment
of the generated config. An attacker can modify this key by
modifying the SESSION superglobal array. This allows the attacker
to close the comment and inject code.

Through a possible bug in PHP running on Windows systems a NULL
byte can truncate the pattern string allowing an attacker to
inject the /e modifier causing the preg_replace function to
execute its second argument as PHP code.

Fixed filtering of a file path in the MIME-type transformation
code, which allowed for directory traversal.

OSVersionArchitecturePackageVersionFilename
FreeBSDanynoarchphpmyadmin< 3.4.3.1UNKNOWN

CVSS2

7.5

Attack Vector

NETWORK

Attack Complexity

LOW

Authentication

NONE

Confidentiality Impact

PARTIAL

Integrity Impact

PARTIAL

Availability Impact

PARTIAL

AV:N/AC:L/Au:N/C:P/I:P/A:P

EPSS

0.22

Percentile

96.5%