The configuration setup script (aka scripts/setup.php) in phpMyAdmin 2.11.x before 2.11.10.1 does not properly restrict key names in its output file, which allows remote attackers to execute arbitrary PHP code via a crafted POST request.
Weaknesses in this category are related to the management of permissions, privileges, and other security features that are used to perform access control.
Link | Tags |
---|---|
http://www.securityfocus.com/bid/42591 | patch vdb entry |
http://www.phpmyadmin.net/home_page/security/PMASA-2010-4.php | patch vendor advisory |
http://secunia.com/advisories/41058 | third party advisory vendor advisory |
http://sourceforge.net/tracker/?func=detail&aid=3045132&group_id=23067&atid=377408 | exploit |
http://www.vupen.com/english/advisories/2010/2231 | vdb entry vendor advisory |
http://www.debian.org/security/2010/dsa-2097 | vendor advisory |
http://www.mandriva.com/security/advisories?name=MDVSA-2010:163 | vendor advisory |
http://phpmyadmin.git.sourceforge.net/git/gitweb.cgi?p=phpmyadmin/phpmyadmin%3Ba=commitdiff%3Bh=30c83acddb58d3bbf940b5f9ec28abf5b235f4d2 | |
http://www.vupen.com/english/advisories/2010/2223 | vdb entry vendor advisory |
http://secunia.com/advisories/41185 | third party advisory vendor advisory |