| VID |
22097 |
| Severity |
40 |
| Port |
80, ... |
| Protocol |
TCP |
| Class |
WWW |
| Detailed Description |
An input validation error exists in phpMyAdmin on the web server that could allow remote users to cause arbitrary files to be included and loaded by the PHP interpreter at runtime. phpMyAdmin is an easy to use web based administration interface for MySQL written in PHP. It was written by Tobias Ratschiller, author of several PHP textbooks, regular speaker on PHP and prominent member of the PHP community. phpMyAdmin is extremely popular and very widespread (site rankings show it almost as popular as PHP itself) since it makes most MySQL administration tasks much easier. phpMyAdmin makes insecure calls to the PHP function include(). The versions up to and including official 2.1.0, or less than 2.2.0pre5 of unofficial project allows an attacker to execute arbitrary commands on the remote web server, or to read the configuration files of the installation thereby gaining database credentials with the permissions of the web server user. Please note that enabling 'Advanced Authentication' does not prevent this attack.
* References: http://www.securityfocus.com/bid/2642 http://sourceforge.net/project/showfiles.php?group_id=23067 |
| Recommendation |
SecureReality is providing patches for the problems from: phpMyAdmin 2.2.0: http://www.securereality.com.au/patches/phpMyAdmin-SecureReality.diff
Users of earlier versions are advised to upgrade to the versions specified then apply the patches. To apply the patches: - cd to the directory in which the application files are stored (e.g /home/httpd/html/phpMyAdmin/) - run 'patch -p0 < *Path to patch filename*'
Development of phpMyAdmin has been continued by an independent and unauthorized (as yet) group of developers who have released a new version that contains fixes for this problem. You can upgrade to their version (2.2.0pre5) from: http://sourceforge.net/project/showfiles.php?group_id=23067 |
| Related URL |
CVE-2001-0478 (CVE) |
| Related URL |
(SecurityFocus) |
| Related URL |
(ISS) |
|