CRLF injection vulnerability in bs_disp_as_mime_type.php in the BLOB streaming feature in phpMyAdmin before 3.1.3.1 allows remote attackers to inject arbitrary HTTP headers and conduct HTTP response splitting attacks via the (1) c_type and possibly (2) file_type parameters.
The product receives input or data, but it does not validate or incorrectly validates that the input has the properties that are required to process the data safely and correctly.
Link | Tags |
---|---|
http://phpmyadmin.svn.sourceforge.net/viewvc/phpmyadmin/branches/MAINT_3_1_3/phpMyAdmin/bs_disp_as_mime_type.php?r1=12303&r2=12302&pathrev=12303 | patch |
http://secunia.com/advisories/34642 | third party advisory |
http://lists.opensuse.org/opensuse-security-announce/2009-04/msg00003.html | vendor advisory |
http://secunia.com/advisories/34468 | third party advisory |
http://www.phpmyadmin.net/home_page/security/PMASA-2009-1.php | patch vendor advisory |