Debian Security Advisory
DSA-1557-1 phpmyadmin -- insufficient input sanitising
- Date Reported:
- 24 Apr 2008
- Affected Packages:
- Security database references:
- In Mitre's CVE dictionary: CVE-2008-1149, CVE-2008-1567, CVE-2008-1924, CVE-2008-1924, CVE-2008-1567, CVE-2008-1149.
- More information:
Several remote vulnerabilities have been discovered in phpMyAdmin, an application to administrate MySQL over the WWW. The Common Vulnerabilities and Exposures project identifies the following problems:
Attackers with CREATE table permissions were allowed to read arbitrary files readable by the webserver via a crafted HTTP POST request.
The PHP session data file stored the username and password of a logged in user, which in some setups can be read by a local user.
Cross site scripting and SQL injection were possible by attackers that had permission to create cookies in the same cookie domain as phpMyAdmin runs in.
For the stable distribution (etch), these problems have been fixed in version 4:22.214.171.124-7.
For the unstable distribution (sid), these problems have been fixed in version 4:126.96.36.199-1.
We recommend that you upgrade your phpmyadmin package.
- Fixed in:
Debian GNU/Linux 4.0 (etch)
- Architecture-independent component:
MD5 checksums of the listed files are available in the original advisory.