|
Family: Gentoo Local Security Checks --> Category: infos
[GLSA-200510-21] phpMyAdmin: Local file inclusion and XSS vulnerabilities Vulnerability Scan
Vulnerability Scan Summary phpMyAdmin: Local file inclusion and XSS vulnerabilities
Detailed Explanation for this Vulnerability Test
The remote host is affected by the vulnerability described in GLSA-200510-21
(phpMyAdmin: Local file inclusion and XSS vulnerabilities)
Stefan Esser discovered that by calling certain PHP files
directly, it was possible to workaround the grab_globals.lib.php
security model and overwrite the $cfg configuration array. Systems
running PHP in safe mode are not affected. Futhermore, Tobias Klein
reported several cross-site-scripting issues resulting from
insufficient user input sanitizing.
Impact
A local attacker may exploit this vulnerability by sending
malicious requests, causing the execution of arbitrary code with the
rights of the user running the web server. Furthermore, the cross-site
scripting issues give a remote attacker the ability to inject and
execute malicious script code or to steal cookie-based authentication
credentials, potentially compromising the victim's browser.
Workaround
There is no known workaround for all those issues at this time.
References:
http://www.phpmyadmin.net/home_page/security.php?issue=PMASA-2005-5
Solution:
All phpMyAdmin users should upgrade to the latest version:
# emerge --sync
# emerge --ask --oneshot --verbose ">=dev-db/phpmyadmin-2.6.4_p3"
Threat Level: Medium
Click HERE for more information and discussions on this network vulnerability scan.
|