|
Family: CGI abuses --> Category: attack
phpMyAdmin < 2.6.4-pl3 Multiple Vulnerabilities Vulnerability Scan
Vulnerability Scan Summary Checks for multiple vulnerabilities in phpMyAdmin < 2.6.4-pl3
Detailed Explanation for this Vulnerability Test
Synopsis :
The remote web server contains a PHP application that is prone to
several flaws.
Description :
The version of phpMyAdmin installed on the remote host is affected by
a local file inclusion vulnerability, which can be exploited by an
unauthenticated attacker to read arbitrary files, and possibly even to
execute arbitrary PHP code on the affected host subject to the
permissions of the web server user id.
In addition, the application fails to sanitize user-supplied input to
the 'hash' parameter in the 'left.php' and 'queryframe.php' scripts as
well as the 'sort_order' and 'sort_by' parameters in the
'server_databases.php' script before using it to generate dynamic
HTML, which can lead to cross-site scripting attacks against the
affected application.
See also :
http://www.phpmyadmin.net/home_page/security.php?issue=PMASA-2005-5
Solution :
Upgrade to phpMyAdmin 2.6.4-pl3 or later.
Threat Level:
Medium / CVSS Base Score : 6
(AV:R/AC:H/Au:NR/C:P/A:P/I:P/B:N)
Click HERE for more information and discussions on this network vulnerability scan.
|