CERT-In Vulnerability Note
CIVN-2005-0110
PhpMyAdmin Local file inclusion and Cross site scripting vulnerabilities
Original Issue Date:November 08, 2005
Severity Rating: HIGH
Systems Affected
2.6.4-pl2 and prior
Overview
Two vulnerabilities reported in phpMyAdmin which could be exploited by remote attackers to conduct cross-site scripting attacks or disclose sensitive information.
Description
PhpMyAdmin is a tool written in PHP intended to handle the administration of MySQL over the Web. The first vulnerability is due to improper validation of input passed to certain configuration parameters in some scripts of phpMyAdmin. This could be exploited to include arbitrary files from local resources.
The second issue is due to errors in scripts left.php, queryframe.php and server_database.php which do not properly validate specially crafted parameters. Successful exploitation allows an attacker to execute arbitrary scripted content in a users web browser in the context of the site running phpMyAdmin.
Solution
Update to version 2.6.4-pl3 or later.
http://www.phpmyadmin.net/home_page/downloads.php
Vendor Information
phpMyAdmin
http://www.phpmyadmin.net/home_page/security.php?issue=PMASA-2005-5
References
Hardened-PHP Project
http://www.hardened-php.net/advisory_162005.73.html
Secunia Advisory SA 17289
http://secunia.com/advisories/17289/
CVE Name
CAN-2005-3301
CVE-2005-3300
Disclaimer
The information provided herein is on "as is" basis, without warranty of any kind.
Contact Information
Email: info@cert-in.org.in Phone: +91-11-2436857
Postal address
Indian Computer Emergency Response Team (CERT-In) Ministry of Electronics and Information Technology Government of India Electronics Niketan 6, CGO Complex, Lodhi Road, New Delhi - 110 003 India
|