Korean
<< Back
VID 21995
Severity 30
Port 80, ...
Protocol TCP
Class CGI
Detailed Description The phpMyAdmin program is vulnerable to multiple vulnerabilities which exist in versions prior to 2.9.0.1. phpMyAdmin is a tool written in PHP intended to handle the administration of MySQL over the WWW. Currently it can create and drop databases, create/drop/alter tables, delete/edit/add fields, execute any SQL statement, manage keys on fields. phpMyAdmin versions prior to 2.9.0.1 are vulnerable to the following issues:

The first issue is an unspecified vulnerability in the phpMyAdmin libraries 'common.lib.php', 'session.inc.php' and 'url_generating.lib.php' scripts. The cause and impact of this vulnerability is currently unknown.
The second issue allows a remote attacker to obtain unauthorized access to restricted files. A remote attacker could exploit this vulnerability by sending a request for arbitrary file within the libraries directory.
The third issue is a cross-site scripting issue, caused by improper validation of user-supplied input. A remote attacker could exploit this vulnerability to execute SQL queries on the affected system.

* References:
http://www.hardened-php.net/advisory_072006.130.html
http://secunia.com/advisories/22126
http://archives.neohapsis.com/archives/fulldisclosure/2006-10/0006.html
http://www.securityfocus.com/archive/1/archive/1/447491/100/0/threaded

* Platforms Affected:
Tobias Ratschiller, phpMyAdmin versions prior to 2.9.0.1
Any operating system Any version
Recommendation Upgrade to the latest version of phpMyAdmin (2.9.0.1 or later), available from the phpMyAdmin Download Web page at http://www.phpmyadmin.net/home_page/downloads.php
Related URL CVE-2006-5116,CVE-2006-5117 (CVE)
Related URL 20253 (SecurityFocus)
Related URL 29329,29330,29301 (ISS)