Gentoo Archives: gentoo-announce

From: Thierry Carrez <koon@g.o>
To: gentoo-announce@l.g.o
Cc: bugtraq@×××××××××××××.com, full-disclosure@××××××××××××××.uk, security-alerts@×××××××××××××.com
Subject: [gentoo-announce] [ GLSA 200510-21 ] phpMyAdmin: Local file inclusion and XSS vulnerabilities
Date: Tue, 25 Oct 2005 12:07:00
Message-Id: 435E1BBB.7000500@gentoo.org
1 - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
2 Gentoo Linux Security Advisory GLSA 200510-21
3 - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
4 http://security.gentoo.org/
5 - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
6
7 Severity: Normal
8 Title: phpMyAdmin: Local file inclusion and XSS vulnerabilities
9 Date: October 25, 2005
10 Bugs: #110146
11 ID: 200510-21
12
13 - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
14
15 Synopsis
16 ========
17
18 phpMyAdmin contains a local file inclusion vulnerability that may lead
19 to the execution of arbitrary code, along with several cross-site
20 scripting issues.
21
22 Background
23 ==========
24
25 phpMyAdmin is a tool written in PHP intended to handle the
26 administration of MySQL over the web.
27
28 Affected packages
29 =================
30
31 -------------------------------------------------------------------
32 Package / Vulnerable / Unaffected
33 -------------------------------------------------------------------
34 1 dev-db/phpmyadmin < 2.6.4_p3 >= 2.6.4_p3
35
36 Description
37 ===========
38
39 Stefan Esser discovered that by calling certain PHP files directly, it
40 was possible to workaround the grab_globals.lib.php security model and
41 overwrite the $cfg configuration array. Systems running PHP in safe
42 mode are not affected. Futhermore, Tobias Klein reported several
43 cross-site-scripting issues resulting from insufficient user input
44 sanitizing.
45
46 Impact
47 ======
48
49 A local attacker may exploit this vulnerability by sending malicious
50 requests, causing the execution of arbitrary code with the rights of
51 the user running the web server. Furthermore, the cross-site scripting
52 issues give a remote attacker the ability to inject and execute
53 malicious script code or to steal cookie-based authentication
54 credentials, potentially compromising the victim's browser.
55
56 Workaround
57 ==========
58
59 There is no known workaround for all those issues at this time.
60
61 Resolution
62 ==========
63
64 All phpMyAdmin users should upgrade to the latest version:
65
66 # emerge --sync
67 # emerge --ask --oneshot --verbose ">=dev-db/phpmyadmin-2.6.4_p3"
68
69 References
70 ==========
71
72 [ 1 ] PMASA-2005-5
73 http://www.phpmyadmin.net/home_page/security.php?issue=PMASA-2005-5
74
75 Availability
76 ============
77
78 This GLSA and any updates to it are available for viewing at
79 the Gentoo Security Website:
80
81 http://security.gentoo.org/glsa/glsa-200510-21.xml
82
83 Concerns?
84 =========
85
86 Security is a primary focus of Gentoo Linux and ensuring the
87 confidentiality and security of our users machines is of utmost
88 importance to us. Any security concerns should be addressed to
89 security@g.o or alternatively, you may file a bug at
90 http://bugs.gentoo.org.
91
92 License
93 =======
94
95 Copyright 2005 Gentoo Foundation, Inc; referenced text
96 belongs to its owner(s).
97
98 The contents of this document are licensed under the
99 Creative Commons - Attribution / Share Alike license.
100
101 http://creativecommons.org/licenses/by-sa/2.0

Attachments

File name MIME type
signature.asc application/pgp-signature