Lucene search

K
phpmyadminPhpMyAdminPHPMYADMIN:PMASA-2008-1
HistoryMar 01, 2008 - 12:00 a.m.

SQL injection vulnerability (Delayed Cross Site Request Forgery)

2008-03-0100:00:00
www.phpmyadmin.net
20

CVSS2

5.1

Attack Vector

NETWORK

Attack Complexity

HIGH

Authentication

NONE

Confidentiality Impact

PARTIAL

Integrity Impact

PARTIAL

Availability Impact

PARTIAL

AV:N/AC:H/Au:N/C:P/I:P/A:P

EPSS

0.003

Percentile

66.4%

PMASA-2008-1

Announcement-ID: PMASA-2008-1

Date: 2008-03-01

Updated: 2008-03-03

Summary

SQL injection vulnerability (Delayed Cross Site Request Forgery)

Description

We received an advisory from Richard Cunningham, and we wish to thank him for his work. phpMyAdmin used the $$_REQUEST superglobal as a source for its parameters, instead of $$_GET and $$_POST superglobals. This means that on most servers, a cookie with the same name as one of phpMyAdmin’s parameters can interfere.

Another application could set a cookie for the root path “/” with a “sql_query” name, therefore overriding the user-submitted sql_query because by default, the $$_REQUEST superglobal imports first GET, then POST then COOKIE data.

Severity

We consider this vulnerability to be serious.

Mitigation factor

An attacker must trick the victim into visiting a page on the same web server where he has placed code that creates a malicious cookie.

Affected Versions

Versions before 2.11.5.

Solution

Upgrade to phpMyAdmin 2.11.5 or newer, where $$_REQUEST is rebuilt to not contain cookies.

References

Assigned CVE ids: CVE-2008-1149

CWE ids: CWE-661 CWE-89

Patches

The following commits have been made to fix this issue:

More information

For further information and in case of questions, please contact the phpMyAdmin team. Our website is phpmyadmin.net.

CVSS2

5.1

Attack Vector

NETWORK

Attack Complexity

HIGH

Authentication

NONE

Confidentiality Impact

PARTIAL

Integrity Impact

PARTIAL

Availability Impact

PARTIAL

AV:N/AC:H/Au:N/C:P/I:P/A:P

EPSS

0.003

Percentile

66.4%