Debian Security Advisory

DSA-1557-1 phpmyadmin -- insufficient input sanitising

Date Reported:
24 Apr 2008
Affected Packages:
phpmyadmin
Vulnerable:
Yes
Security database references:
In Mitre's CVE dictionary: CVE-2008-1149, CVE-2008-1567, CVE-2008-1924, CVE-2008-1924, CVE-2008-1567, CVE-2008-1149.
More information:

Several remote vulnerabilities have been discovered in phpMyAdmin, an application to administrate MySQL over the WWW. The Common Vulnerabilities and Exposures project identifies the following problems:

  • CVE-2008-1924

    Attackers with CREATE table permissions were allowed to read arbitrary files readable by the webserver via a crafted HTTP POST request.

  • CVE-2008-1567

    The PHP session data file stored the username and password of a logged in user, which in some setups can be read by a local user.

  • CVE-2008-1149

    Cross site scripting and SQL injection were possible by attackers that had permission to create cookies in the same cookie domain as phpMyAdmin runs in.

For the stable distribution (etch), these problems have been fixed in version 4:2.9.1.1-7.

For the unstable distribution (sid), these problems have been fixed in version 4:2.11.5.2-1.

We recommend that you upgrade your phpmyadmin package.

Fixed in:

Debian GNU/Linux 4.0 (etch)

Source:
http://security.debian.org/pool/updates/main/p/phpmyadmin/phpmyadmin_2.9.1.1-7.diff.gz
http://security.debian.org/pool/updates/main/p/phpmyadmin/phpmyadmin_2.9.1.1.orig.tar.gz
http://security.debian.org/pool/updates/main/p/phpmyadmin/phpmyadmin_2.9.1.1-7.dsc
Architecture-independent component:
http://security.debian.org/pool/updates/main/p/phpmyadmin/phpmyadmin_2.9.1.1-7_all.deb

MD5 checksums of the listed files are available in the original advisory.