Path traversal in Opensuse and phpMyAdmin - CVE-2014-8959

 

Path traversal in Opensuse and phpMyAdmin - CVE-2014-8959

Published: November 30, 2014 / Updated: August 9, 2020


Vulnerability identifier: #VU41046
CSH Severity: Low
CVSS v4.0: CVSS:4.0/AV:N/AC:L/AT:N/PR:H/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N/E:U/U:Clear
CVE-ID: CVE-2014-8959
CWE-ID: CWE-22
Exploitation vector: Remote access
Exploit availability: No public exploit available
Vendor: SUSE
phpMyAdmin
Affected software:
Opensuse
phpMyAdmin

Detailed vulnerability description

The vulnerability allows a remote attacker to perform directory traversal attacks.

The vulnerability exists due to input validation error when processing directory traversal sequences in libraries/gis/GIS_Factory.class.php in the GIS editor in phpMyAdmin 4.0.x before 4.0.10.6, 4.1.x before 4.1.14.7, and 4.2.x before 4.2.12. A remote authenticated attacker can send a specially crafted HTTP request and remote authenticated users to include and execute arbitrary local files via a crafted geometry-type parameter.


How to mitigate CVE-2014-8959

Cybersecurity Help is currently unaware of any official solution to address this vulnerability.

Sources