PMASA-2013-7

Announcement-ID: PMASA-2013-7

Date: 2013-06-30
Updated: 2013-07-01

Summary

Global variable scope injection.


Description

The import.php script was vulnerable to GLOBALS variable injection. Therefore, an attacker could manipulate any configuration parameter.
Severity

We consider this vulnerability to be serious.


Mitigation factor
This vulnerability can be triggered only by someone who logged in to phpMyAdmin, as the usual token protection prevents non-logged-in users from accessing the required form.


Affected Versions

Versions 4.0.x up to 4.0.4 are affected.


Unaffected Versions

Versions prior to 4.0.0 are not affected.


Solution

Upgrade to phpMyAdmin 4.0.4.1 or newer, or apply the patch listed below.


References

Thanks to Markus Wulftange of Daimler TSS for reporting this issue.

Assigned CVE ids: CVE-2013-4729

CWE ids: CWE-621 CWE-661


Patches

import.php
@@ -122,6 +122,24 @@
  * We only need to load the selected plugin
  */
 
+if (! in_array(
+    $format, 
+    array(
+        'csv',
+        'ldi',
+        'mediawiki',
+        'ods',
+        'shp',
+        'sql',
+        'xml'
+    )
+)
+) {
+    // this should not happen for a normal user
+    // but only during an attack
+    PMA_fatalError('Incorrect format parameter');
+}
+
 $post_patterns = array(
     '/^force_file_/',
     '/^'. $format . '_/'