Vulnerability Scanning Solutions, LLC.
Home
Our Process
Residential
Corporate
What We Scan For
Sample Report
Client List
Terms
Contact Us
What We Scan For
Family: CGI abuses --> Category: attack

phpMyAdmin < 2.6.4-pl3 Multiple Vulnerabilities Vulnerability Scan


Vulnerability Scan Summary
Checks for multiple vulnerabilities in phpMyAdmin < 2.6.4-pl3

Detailed Explanation for this Vulnerability Test

Synopsis :

The remote web server contains a PHP application that is prone to
several flaws.

Description :

The version of phpMyAdmin installed on the remote host is affected by
a local file inclusion vulnerability, which can be exploited by an
unauthenticated attacker to read arbitrary files, and possibly even to
execute arbitrary PHP code on the affected host subject to the
permissions of the web server user id.

In addition, the application fails to sanitize user-supplied input to
the 'hash' parameter in the 'left.php' and 'queryframe.php' scripts as
well as the 'sort_order' and 'sort_by' parameters in the
'server_databases.php' script before using it to generate dynamic
HTML, which can lead to cross-site scripting attacks against the
affected application.

See also :

http://www.phpmyadmin.net/home_page/security.php?issue=PMASA-2005-5

Solution :

Upgrade to phpMyAdmin 2.6.4-pl3 or later.

Threat Level:

Medium / CVSS Base Score : 6
(AV:R/AC:H/Au:NR/C:P/A:P/I:P/B:N)

Click HERE for more information and discussions on this network vulnerability scan.

VSS, LLC.

P.O. Box 827051

Pembroke Pines, FL 33082-7051

Vulnerability Scanning Solutions, LLC.