PMASA-2013-7
Announcement-ID: PMASA-2013-7
Date: 2013-06-30
Updated: 2013-07-01
Summary
Global variable scope injection.
Description
The import.php script was vulnerable to GLOBALS variable injection. Therefore, an attacker could manipulate any configuration parameter.
Severity
We consider this vulnerability to be serious.
Mitigation factor
This vulnerability can be triggered only by someone who logged in to phpMyAdmin, as the usual token protection prevents non-logged-in users from accessing the required form.
Affected Versions
Versions 4.0.x up to 4.0.4 are affected.
Unaffected Versions
Versions prior to 4.0.0 are not affected.
Solution
Upgrade to phpMyAdmin 4.0.4.1 or newer, or apply the patch listed below.
References
Thanks to Markus Wulftange of Daimler TSS for reporting this issue.
Assigned CVE ids: CVE-2013-4729
CWE ids: CWE-621 CWE-661
Patches
import.php
@@ -122,6 +122,24 @@
* We only need to load the selected plugin
*/
+if (! in_array(
+ $format,
+ array(
+ 'csv',
+ 'ldi',
+ 'mediawiki',
+ 'ods',
+ 'shp',
+ 'sql',
+ 'xml'
+ )
+)
+) {
+ // this should not happen for a normal user
+ // but only during an attack
+ PMA_fatalError('Incorrect format parameter');
+}
+
$post_patterns = array(
'/^force_file_/',
'/^'. $format . '_/'