phpMyAdmin setup.php Arbitrary PHP Code Execution (PMASA-2010-4)

high Nessus Plugin ID 48908

Synopsis

The remote web server contains a PHP application that may allow execution of arbitrary code.

Description

The setup script included with the version of phpMyAdmin installed on the remote host does not properly sanitize user-supplied input before using it to generate a config file for the application. Submitting a specially crafted POST request can result in arbitrary PHP code injection.

A remote attacker could exploit this by using the setup script to generate a configuration file with injected PHP code, save it on the server, and load it, causing arbitrary PHP code to be executed with the privileges of the web server.

Solution

Upgrade to phpMyAdmin 2.11.10.1 or later.

See Also

http://www.nessus.org/u?b30f398f

https://www.phpmyadmin.net/security/PMASA-2010-4/

Plugin Details

Severity: High

ID: 48908

File Name: phpmyadmin_pmasa_2010_4.nasl

Version: 1.14

Type: remote

Family: CGI abuses

Published: 8/27/2010

Updated: 4/11/2022

Configuration: Enable thorough checks

Supported Sensors: Nessus

Risk Information

VPR

Risk Factor: Medium

Score: 6.6

CVSS v2

Risk Factor: High

Base Score: 7.5

Temporal Score: 5.5

Vector: CVSS2#AV:N/AC:L/Au:N/C:P/I:P/A:P

Vulnerability Information

CPE: cpe:/a:phpmyadmin:phpmyadmin

Required KB Items: www/PHP, www/phpMyAdmin

Excluded KB Items: Settings/disable_cgi_scanning

Exploit Ease: No exploit is required

Exploited by Nessus: true

Patch Publication Date: 8/20/2010

Vulnerability Publication Date: 8/15/2010

Reference Information

CVE: CVE-2010-3055

BID: 42591

SECUNIA: 41058