Korean
<< Back
VID 21491
Severity 40
Port 80, ...
Protocol TCP
Class CGI
Detailed Description The phpMyAdmin software is vulnerable to multiple local file include vulnerabilities. phpMyAdmin is a tool written in PHP intended to handle the administration of MySQL over the WWW. Currently it can create and drop databases, create/drop/alter tables, delete/edit/add fields, execute any SQL statement, manage keys on fields. phpMyAdmin versions 2.6.1 and earlier could allow a remote attacker to include arbitrary files, due to a failure of the application to properly sanitize user-supplied input prior to using it in a PHP 'include()', 'require()', 'require-once()', or similar function call. Specifically, input passed to the "GLOBALS[cfg][ThemePath]" parameter in "phpmyadmin.css.php" and "cfg[Server][extension]" parameter in "database_interface.lib.php" is not properly verified before being used to include files. This can be exploited to include arbitrary files from local resources and execute arbitrary server-side script code that resides on an affected computer with the privileges of the Web server process. Successful exploitation requires that "register_globals" is enabled and that "magic_quotes_gpc" is disabled.

* References:
http://www.phpmyadmin.net/home_page/security.php?issue=PMASA-2005-1
http://secunia.com/advisories/14382/

* Platforms Affected:
Tobias Ratschiller, phpMyAdmin 2.6.1 and earlier
Any Operating system Any version
Recommendation Upgrade to the latest version of phpMyAdmin (2.6.1-pl1 or later), available from the phpMyAdmin Download Web page at http://www.phpmyadmin.net/home_page/downloads.php
Related URL CVE-2005-0544,CVE-2005-0567 (CVE)
Related URL 12645 (SecurityFocus)
Related URL 19465 (ISS)