Lucene search

K
gentooGentoo FoundationGLSA-200510-16
HistoryOct 17, 2005 - 12:00 a.m.

phpMyAdmin: Local file inclusion vulnerability

2005-10-1700:00:00
Gentoo Foundation
security.gentoo.org
46

CVSS2

5

Attack Vector

NETWORK

Attack Complexity

LOW

Authentication

NONE

Confidentiality Impact

NONE

Integrity Impact

PARTIAL

Availability Impact

NONE

AV:N/AC:L/Au:N/C:N/I:P/A:N

EPSS

0.016

Percentile

87.5%

Background

phpMyAdmin is a tool written in PHP intended to handle the administration of MySQL over the web.

Description

Maksymilian Arciemowicz reported that in libraries/grab_globals.lib.php, the $__redirect parameter was not correctly validated. Systems running PHP in safe mode are not affected.

Impact

A local attacker may exploit this vulnerability by sending malicious requests, causing the execution of arbitrary code with the rights of the user running the web server.

Workaround

Run PHP in safe mode.

Resolution

All phpMyAdmin users should upgrade to the latest version:

 # emerge --sync
 # emerge --ask --oneshot --verbose ">=dev-db/phpmyadmin-2.6.4_p2"
OSVersionArchitecturePackageVersionFilename
Gentooanyalldev-db/phpmyadmin< 2.6.4_p2UNKNOWN

CVSS2

5

Attack Vector

NETWORK

Attack Complexity

LOW

Authentication

NONE

Confidentiality Impact

NONE

Integrity Impact

PARTIAL

Availability Impact

NONE

AV:N/AC:L/Au:N/C:N/I:P/A:N

EPSS

0.016

Percentile

87.5%