Korean
<< Back
VID 22097
Severity 40
Port 80, ...
Protocol TCP
Class WWW
Detailed Description An input validation error exists in phpMyAdmin on the web server that could allow remote users to cause arbitrary files to be included and loaded by the PHP interpreter at runtime.
phpMyAdmin is an easy to use web based administration interface for MySQL written in PHP. It was written by Tobias Ratschiller, author of several PHP textbooks, regular speaker on PHP and prominent member of the PHP community. phpMyAdmin is extremely popular and very widespread (site rankings show it almost as popular as PHP itself) since it makes most MySQL administration tasks much easier.
phpMyAdmin makes insecure calls to the PHP function include(). The versions up to and including official 2.1.0, or less than 2.2.0pre5 of unofficial project allows an attacker to execute arbitrary commands on the remote web server, or to read the configuration files of the installation thereby gaining database credentials with the permissions of the web server user. Please note that enabling 'Advanced Authentication' does not prevent this attack.

* References:
http://www.securityfocus.com/bid/2642
http://sourceforge.net/project/showfiles.php?group_id=23067
Recommendation SecureReality is providing patches for the problems from:
phpMyAdmin 2.2.0: http://www.securereality.com.au/patches/phpMyAdmin-SecureReality.diff

Users of earlier versions are advised to upgrade to the versions specified then apply the patches.
To apply the patches:
- cd to the directory in which the application files are stored (e.g /home/httpd/html/phpMyAdmin/)
- run 'patch -p0 < *Path to patch filename*'

Development of phpMyAdmin has been continued by an independent and unauthorized (as yet) group of developers who have released a new version that contains fixes for this problem. You can upgrade to their version (2.2.0pre5) from:
http://sourceforge.net/project/showfiles.php?group_id=23067
Related URL CVE-2001-0478 (CVE)
Related URL (SecurityFocus)
Related URL (ISS)