VID |
21995 |
Severity |
30 |
Port |
80, ... |
Protocol |
TCP |
Class |
CGI |
Detailed Description |
The phpMyAdmin program is vulnerable to multiple vulnerabilities which exist in versions prior to 2.9.0.1. phpMyAdmin is a tool written in PHP intended to handle the administration of MySQL over the WWW. Currently it can create and drop databases, create/drop/alter tables, delete/edit/add fields, execute any SQL statement, manage keys on fields. phpMyAdmin versions prior to 2.9.0.1 are vulnerable to the following issues:
The first issue is an unspecified vulnerability in the phpMyAdmin libraries 'common.lib.php', 'session.inc.php' and 'url_generating.lib.php' scripts. The cause and impact of this vulnerability is currently unknown. The second issue allows a remote attacker to obtain unauthorized access to restricted files. A remote attacker could exploit this vulnerability by sending a request for arbitrary file within the libraries directory. The third issue is a cross-site scripting issue, caused by improper validation of user-supplied input. A remote attacker could exploit this vulnerability to execute SQL queries on the affected system.
* References: http://www.hardened-php.net/advisory_072006.130.html http://secunia.com/advisories/22126 http://archives.neohapsis.com/archives/fulldisclosure/2006-10/0006.html http://www.securityfocus.com/archive/1/archive/1/447491/100/0/threaded
* Platforms Affected: Tobias Ratschiller, phpMyAdmin versions prior to 2.9.0.1 Any operating system Any version |
Recommendation |
Upgrade to the latest version of phpMyAdmin (2.9.0.1 or later), available from the phpMyAdmin Download Web page at http://www.phpmyadmin.net/home_page/downloads.php |
Related URL |
CVE-2006-5116,CVE-2006-5117 (CVE) |
Related URL |
20253 (SecurityFocus) |
Related URL |
29329,29330,29301 (ISS) |
|