Korean
<< Back
VID 21421
Severity 40
Port 80, ...
Protocol TCP
Class CGI
Detailed Description The phpMyAdmin package, according to its version number, has multiple vulnerabilities(2). phpMyAdmin is a tool written in PHP intended to handle the administration of MySQL over the WWW. Currently it can create and drop databases, create/drop/alter tables, delete/edit/add fields, execute any SQL statement, manage keys on fields. phpMyAdmin version 2.4.0 through 2.6.0-pl2 are vulnerable to the following issues:

The first issue may allow a remote attacker to execute arbitrary commands on a server that is not running in safe mode. The vulnerability specifically lies in the external MIME-based transformations functionality.

The second issue allows an attacker to disclose arbitrary files residing on a vulnerable server that is not running in safe mode. An attacker requires access to the phpMyAdmin interface to carry out this attack. This issue can be exploited through the 'sql_localfile' parameter of the 'read_dump.php' script and it requires the '$cfg['UploadDir']' directive to be defined on the server.

* Note: This check solely relied on the version number of the remote phpMyAdmin software to assess this vulnerability, so this might be a false positive.

* References:
http://www.securityfocus.com/archive/1/384199

* Platforms Affected:
Tobias Ratschiller, phpMyAdmin 2.4.0 through 2.6.0-pl2
Any operating system Any version
Recommendation Upgrade to the latest version of phpMyAdmin (2.6.1-rc1 or later), available from the phpMyAdmin Download Web page at http://www.phpmyadmin.net/home_page/downloads.php
Related URL CVE-2004-1147,CVE-2004-1148 (CVE)
Related URL 11886 (SecurityFocus)
Related URL 18441,18443 (ISS)