Vulnerability identifier: #VU44864
Vulnerability risk: Medium
CVSSv4.0: 2.7 [CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:L/VA:L/SC:N/SI:N/SA:N/E:U/U:Green]
CVE-ID:
CWE-ID:
CWE-20
Exploitation vector: Network
Exploit availability: No
Vulnerable software:
phpMyAdmin
Web applications /
Remote management & hosting panels
Vendor: phpMyAdmin
Description
The vulnerability allows a remote non-authenticated attacker to manipulate or delete data.
libraries/auth/swekey/swekey.auth.lib.php in phpMyAdmin 3.x before 3.3.10.3 and 3.4.x before 3.4.3.2 does not properly manage sessions associated with Swekey authentication, which allows remote attackers to modify the SESSION superglobal array, other superglobal arrays, and certain swekey.auth.lib.php local variables via a crafted query string, a related issue to CVE-2011-2505.
Mitigation
Install update from vendor's website.
Vulnerable software versions
phpMyAdmin: 3.0.0 - 3.0.1.1, 3.1.0 - 3.1.5, 3.2.0 - 3.2.2, 3.3.0.0 - 3.3.10.2, 3.4.0.0 - 3.4.3.1
External links
https://lists.fedoraproject.org/pipermail/package-announce/2011-August/063410.html
https://lists.fedoraproject.org/pipermail/package-announce/2011-August/063418.html
https://osvdb.org/74112
https://phpmyadmin.git.sourceforge.net/git/gitweb.cgi?p=phpmyadmin/phpmyadmin;a=commit;h=571cdc6ff4bf375871b594f4e06f8ad3159d1754
https://phpmyadmin.git.sourceforge.net/git/gitweb.cgi?p=phpmyadmin/phpmyadmin;a=commit;h=e7bb42c002885c2aca7aba4d431b8c63ae4de9b7
https://seclists.org/fulldisclosure/2011/Jul/300
https://secunia.com/advisories/45315
https://secunia.com/advisories/45365
https://secunia.com/advisories/45515
https://securityreason.com/securityalert/8322
https://www.debian.org/security/2011/dsa-2286
https://www.mandriva.com/security/advisories?name=MDVSA-2011:124
https://www.openwall.com/lists/oss-security/2011/07/25/4
https://www.openwall.com/lists/oss-security/2011/07/26/10
https://www.phpmyadmin.net/home_page/security/PMASA-2011-12.php
https://www.securityfocus.com/archive/1/518967/100/0/threaded
https://www.securityfocus.com/archive/1/519155/100/0/threaded
https://www.securityfocus.com/bid/48874
https://www.xxor.se/advisories/phpMyAdmin_3.x_Conditional_Session_Manipulation.txt
https://bugzilla.redhat.com/show_bug.cgi?id=725384
https://exchange.xforce.ibmcloud.com/vulnerabilities/68769
Can this vulnerability be exploited remotely?
Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the Internet.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.