PHPMyAdmin Multiple Local File Include Vulnerabilities
BID:12645
Info
PHPMyAdmin Multiple Local File Include Vulnerabilities
| Bugtraq ID: | 12645 |
| Class: | Input Validation Error |
| CVE: | |
| Remote: | Yes |
| Local: | No |
| Published: | Feb 24 2005 12:00AM |
| Updated: | Feb 24 2005 12:00AM |
| Credit: | Maksymilian Arciemowicz <[email protected]> is credited with the discovery of these issues. |
| Vulnerable: |
S.u.S.E. Linux Personal 9.2 x86_64 S.u.S.E. Linux Personal 9.2 S.u.S.E. Linux Personal 9.1 x86_64 S.u.S.E. Linux Personal 9.1 S.u.S.E. Linux Personal 9.0 x86_64 S.u.S.E. Linux Personal 9.0 S.u.S.E. Linux Personal 8.2 phpMyAdmin phpMyAdmin 2.6.1 -rc1 phpMyAdmin phpMyAdmin 2.6.1 phpMyAdmin phpMyAdmin 2.6 .0pl3 phpMyAdmin phpMyAdmin 2.6 .0pl2 phpMyAdmin phpMyAdmin 2.6 .0pl1 Gentoo Linux |
| Not Vulnerable: |
phpMyAdmin phpMyAdmin 2.6.1 pl1 |
Discussion
PHPMyAdmin Multiple Local File Include Vulnerabilities
phpMyAdmin is affected by multiple local file include vulnerabilities. These issues are due to a failure of the application to properly sanitize user-supplied input prior to using it in a PHP 'include()', 'require()', 'require-once()', or similar function call.
An attacker may leverage these issues to execute arbitrary server-side script code that resides on an affected computer with the privileges of the Web server process. This may potentially facilitate unauthorized access.
It should be noted that these issues may also be leveraged to read arbitrary file on an affected computer with the privileges of the Web server.
phpMyAdmin is affected by multiple local file include vulnerabilities. These issues are due to a failure of the application to properly sanitize user-supplied input prior to using it in a PHP 'include()', 'require()', 'require-once()', or similar function call.
An attacker may leverage these issues to execute arbitrary server-side script code that resides on an affected computer with the privileges of the Web server process. This may potentially facilitate unauthorized access.
It should be noted that these issues may also be leveraged to read arbitrary file on an affected computer with the privileges of the Web server.
Exploit / POC
PHPMyAdmin Multiple Local File Include Vulnerabilities
No exploit is required to leverage these issues. The following proof of concepts have been provided:
http://www.example.com/phpMyAdmin/css/phpmyadmin.css.php?GLOBALS[cfg][ThemePath]=/etc/passwd%00&theme=passwd%00
http://www.example.com/phpMyAdmin/css/phpmyadmin.css.php?GLOBALS[cfg][ThemePath]=/etc&theme=passwd%00
http://www.example.com/phpMyAdmin/libraries/database_interface.lib.php?cfg[Server][extension]=cXIb8O3
No exploit is required to leverage these issues. The following proof of concepts have been provided:
http://www.example.com/phpMyAdmin/css/phpmyadmin.css.php?GLOBALS[cfg][ThemePath]=/etc/passwd%00&theme=passwd%00
http://www.example.com/phpMyAdmin/css/phpmyadmin.css.php?GLOBALS[cfg][ThemePath]=/etc&theme=passwd%00
http://www.example.com/phpMyAdmin/libraries/database_interface.lib.php?cfg[Server][extension]=cXIb8O3
Solution / Fix
PHPMyAdmin Multiple Local File Include Vulnerabilities
Solution:
The vendor has released an upgrade dealing with these issues.
Gentoo has released an advisory (GLSA 200503-07) and an updated eBuild to address these issues. Gentoo users that are running the affected software may apply the update by issuing the following sequence of commands as a superuser:
emerge --sync
emerge --ask --oneshot --verbose ">=dev-db/phpmyadmin-2.6.1_p2-r1"
SUSE has released advisory SUSE-SR:2005:007 to address these issues. Please see the referenced advisory for more information.
phpMyAdmin phpMyAdmin 2.6 .0pl3
phpMyAdmin phpMyAdmin 2.6 .0pl2
phpMyAdmin phpMyAdmin 2.6 .0pl1
phpMyAdmin phpMyAdmin 2.6.1 -rc1
phpMyAdmin phpMyAdmin 2.6.1
Solution:
The vendor has released an upgrade dealing with these issues.
Gentoo has released an advisory (GLSA 200503-07) and an updated eBuild to address these issues. Gentoo users that are running the affected software may apply the update by issuing the following sequence of commands as a superuser:
emerge --sync
emerge --ask --oneshot --verbose ">=dev-db/phpmyadmin-2.6.1_p2-r1"
SUSE has released advisory SUSE-SR:2005:007 to address these issues. Please see the referenced advisory for more information.
phpMyAdmin phpMyAdmin 2.6 .0pl3
-
phpMyAdmin phpMyAdmin 2.6.1-pl1
http://prdownloads.sourceforge.net/phpmyadmin/phpMyAdmin-2.6.1-pl1.tar .gz?download
phpMyAdmin phpMyAdmin 2.6 .0pl2
-
phpMyAdmin phpMyAdmin 2.6.1-pl1
http://prdownloads.sourceforge.net/phpmyadmin/phpMyAdmin-2.6.1-pl1.tar .gz?download
phpMyAdmin phpMyAdmin 2.6 .0pl1
-
phpMyAdmin phpMyAdmin 2.6.1-pl1
http://prdownloads.sourceforge.net/phpmyadmin/phpMyAdmin-2.6.1-pl1.tar .gz?download -
SuSE phpMyAdmin-2.6.0-4.6.noarch.rpm
ftp://ftp.suse.com/pub/suse/x86_64/update/9.2/rpm/noarch/phpMyAdmin-2. 6.0-4.6.noarch.rpm
phpMyAdmin phpMyAdmin 2.6.1 -rc1
-
phpMyAdmin phpMyAdmin 2.6.1-pl1
http://prdownloads.sourceforge.net/phpmyadmin/phpMyAdmin-2.6.1-pl1.tar .gz?download
phpMyAdmin phpMyAdmin 2.6.1
-
phpMyAdmin phpMyAdmin 2.6.1-pl1
http://prdownloads.sourceforge.net/phpmyadmin/phpMyAdmin-2.6.1-pl1.tar .gz?download
References
PHPMyAdmin Multiple Local File Include Vulnerabilities
References:
References:
- [ 1149381 ] (in 2.6.1-pl1) Remote file inclusion (phpMyAdmin)
- Main Vendor Homepage (OWASP)
- Re: [SECURITYREASON.COM] phpMyAdmin 2.6.1 Remote file inclusion ("Calum Power"
)