#VU44864 Input validation error in phpMyAdmin - CVE-2011-2719


| Updated: 2020-08-11

Vulnerability identifier: #VU44864

Vulnerability risk: Medium

CVSSv4.0: 2.7 [CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:L/VA:L/SC:N/SI:N/SA:N/E:U/U:Green]

CVE-ID: CVE-2011-2719

CWE-ID: CWE-20

Exploitation vector: Network

Exploit availability: No

Vulnerable software:
phpMyAdmin
Web applications / Remote management & hosting panels

Vendor: phpMyAdmin

Description

The vulnerability allows a remote non-authenticated attacker to manipulate or delete data.

libraries/auth/swekey/swekey.auth.lib.php in phpMyAdmin 3.x before 3.3.10.3 and 3.4.x before 3.4.3.2 does not properly manage sessions associated with Swekey authentication, which allows remote attackers to modify the SESSION superglobal array, other superglobal arrays, and certain swekey.auth.lib.php local variables via a crafted query string, a related issue to CVE-2011-2505.

Mitigation
Install update from vendor's website.

Vulnerable software versions

phpMyAdmin: 3.0.0 - 3.0.1.1, 3.1.0 - 3.1.5, 3.2.0 - 3.2.2, 3.3.0.0 - 3.3.10.2, 3.4.0.0 - 3.4.3.1


External links
https://lists.fedoraproject.org/pipermail/package-announce/2011-August/063410.html
https://lists.fedoraproject.org/pipermail/package-announce/2011-August/063418.html
https://osvdb.org/74112
https://phpmyadmin.git.sourceforge.net/git/gitweb.cgi?p=phpmyadmin/phpmyadmin;a=commit;h=571cdc6ff4bf375871b594f4e06f8ad3159d1754
https://phpmyadmin.git.sourceforge.net/git/gitweb.cgi?p=phpmyadmin/phpmyadmin;a=commit;h=e7bb42c002885c2aca7aba4d431b8c63ae4de9b7
https://seclists.org/fulldisclosure/2011/Jul/300
https://secunia.com/advisories/45315
https://secunia.com/advisories/45365
https://secunia.com/advisories/45515
https://securityreason.com/securityalert/8322
https://www.debian.org/security/2011/dsa-2286
https://www.mandriva.com/security/advisories?name=MDVSA-2011:124
https://www.openwall.com/lists/oss-security/2011/07/25/4
https://www.openwall.com/lists/oss-security/2011/07/26/10
https://www.phpmyadmin.net/home_page/security/PMASA-2011-12.php
https://www.securityfocus.com/archive/1/518967/100/0/threaded
https://www.securityfocus.com/archive/1/519155/100/0/threaded
https://www.securityfocus.com/bid/48874
https://www.xxor.se/advisories/phpMyAdmin_3.x_Conditional_Session_Manipulation.txt
https://bugzilla.redhat.com/show_bug.cgi?id=725384
https://exchange.xforce.ibmcloud.com/vulnerabilities/68769


Q & A

Can this vulnerability be exploited remotely?

Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the Internet.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.


Latest bulletins with this vulnerability