SB2011071503 - Multiple vulnerabilities in phpMyAdmin



SB2011071503 - Multiple vulnerabilities in phpMyAdmin

Published: July 15, 2011 Updated: August 11, 2020

Security Bulletin ID SB2011071503
Severity
Medium
Patch available
NO
Number of vulnerabilities 4
Exploitation vector Remote access
Highest impact Data manipulation

Breakdown by Severity

Medium 50% Low 50%
  • Low
  • Medium
  • High
  • Critical

Description

This security bulletin contains information about 4 secuirty vulnerabilities.


1) Path traversal (CVE-ID: CVE-2011-2508)

The vulnerability allows a remote attacker to perform directory traversal attacks.

The vulnerability exists due to input validation error when processing directory traversal sequences in libraries/display_tbl.lib.php in phpMyAdmin 3.x before 3.3.10.2 and 3.4.x before 3.4.3.1, when a certain MIME transformation feature is enabled,. A remote authenticated attacker can send a specially crafted HTTP request and remote authenticated users to include and execute arbitrary local files via a . (dot dot) in a GLOBALS[mime_map][$meta->name][transformation] parameter.


2) Code Injection (CVE-ID: CVE-2011-2505)

The vulnerability allows a remote non-authenticated attacker to manipulate or delete data.

libraries/auth/swekey/swekey.auth.lib.php in the Swekey authentication feature in phpMyAdmin 3.x before 3.3.10.2 and 3.4.x before 3.4.3.1 assigns values to arbitrary parameters referenced in the query string, which allows remote attackers to modify the SESSION superglobal array via a crafted request, related to a "remote variable manipulation vulnerability."


3) Code Injection (CVE-ID: CVE-2011-2506)

The vulnerability allows a remote non-authenticated attacker to read and manipulate data.

setup/lib/ConfigGenerator.class.php in phpMyAdmin 3.x before 3.3.10.2 and 3.4.x before 3.4.3.1 does not properly restrict the presence of comment closing delimiters, which allows remote attackers to conduct static code injection attacks by leveraging the ability to modify the SESSION superglobal array.


4) Code Injection (CVE-ID: CVE-2011-2507)

The vulnerability allows a remote #AU# to read and manipulate data.

libraries/server_synchronize.lib.php in the Synchronize implementation in phpMyAdmin 3.x before 3.3.10.2 and 3.4.x before 3.4.3.1 does not properly quote regular expressions, which allows remote authenticated users to inject a PCRE e (aka PREG_REPLACE_EVAL) modifier, and consequently execute arbitrary PHP code, by leveraging the ability to modify the SESSION superglobal array.


Remediation

Cybersecurity Help is not aware of any official remediation provided by the vendor.

References