phpMyAdmin 4.0.4 change the configuration vulnerability

2013.07.05
Risk: Medium
Local: No
Remote: Yes


CVSS Base Score: 5.5/10
Impact Subscore: 4.9/10
Exploitability Subscore: 8/10
Exploit range: Remote
Attack complexity: Low
Authentication: Single time
Confidentiality impact: None
Integrity impact: Partial
Availability impact: Partial

PMASA-2013-7 Announcement-ID: PMASA-2013-7 Date: 2013-06-30 Updated: 2013-07-01 Summary Global variable scope injection. Description The import.php script was vulnerable to GLOBALS variable injection. Therefore, an attacker could manipulate any configuration parameter. Severity We consider this vulnerability to be serious. Mitigation factor This vulnerability can be triggered only by someone who logged in to phpMyAdmin, as the usual token protection prevents non-logged-in users from accessing the required form. Affected Versions Versions 4.0.x up to 4.0.4 are affected. Unaffected Versions Versions prior to 4.0.0 are not affected. Solution Upgrade to phpMyAdmin 4.0.4.1 or newer, or apply the patch listed below. References Thanks to Markus Wulftange of Daimler TSS for reporting this issue. Assigned CVE ids: CVE-2013-4729 CWE ids: CWE-621 CWE-661 Patches import.php @@ -122,6 +122,24 @@ * We only need to load the selected plugin */ +if (! in_array( + $format, + array( + 'csv', + 'ldi', + 'mediawiki', + 'ods', + 'shp', + 'sql', + 'xml' + ) +) +) { + // this should not happen for a normal user + // but only during an attack + PMA_fatalError('Incorrect format parameter'); +} + $post_patterns = array( '/^force_file_/', '/^'. $format . '_/'

References:

https://github.com/phpmyadmin/phpmyadmin/commit/012464268420e53a9cd81cbb4a43988d70393c36
http://www.phpmyadmin.net/home_page/security/PMASA-2013-7.php


Vote for this issue:
50%
50%


 

Thanks for you vote!


 

Thanks for you comment!
Your message is in quarantine 48 hours.

Comment it here.


(*) - required fields.  
{{ x.nick }} | Date: {{ x.ux * 1000 | date:'yyyy-MM-dd' }} {{ x.ux * 1000 | date:'HH:mm' }} CET+1
{{ x.comment }}

Copyright 2024, cxsecurity.com

 

Back to Top