GLSA-200903-32 : phpMyAdmin: Multiple vulnerabilities

This script is Copyright (C) 2009-2016 Tenable Network Security, Inc.

Synopsis :

The remote Gentoo host is missing one or more security-related

Description :

The remote host is affected by the vulnerability described in GLSA-200903-32
(phpMyAdmin: Multiple vulnerabilities)

Multiple vulnerabilities have been reported in phpMyAdmin:
libraries/database_interface.lib.php in phpMyAdmin allows remote
authenticated users to execute arbitrary code via a request to
server_databases.php with a sort_by parameter containing PHP sequences,
which are processed by create_function (CVE-2008-4096).
Cross-site scripting (XSS) vulnerability in pmd_pdf.php allows remote
attackers to inject arbitrary web script or HTML via the db parameter,
a different vector than CVE-2006-6942 and CVE-2007-5977
Cross-site request forgery (CSRF) vulnerability in phpMyAdmin allows
remote authenticated attackers to perform unauthorized actions as the
administrator via a link or IMG tag to tbl_structure.php with a
modified table parameter. NOTE: this can be leveraged to conduct SQL
injection attacks and execute arbitrary code (CVE-2008-5621).
Multiple cross-site request forgery (CSRF) vulnerabilities in
phpMyAdmin allow remote attackers to conduct SQL injection attacks via
unknown vectors related to the table parameter, a different vector than
CVE-2008-5621 (CVE-2008-5622).

Impact :

A remote attacker may execute arbitrary code with the rights of the
webserver, inject and execute SQL with the rights of phpMyAdmin or
conduct XSS attacks against other users.

Workaround :

There is no known workaround at this time.

See also :

Solution :

All phpMyAdmin users should upgrade to the latest version:
# emerge --sync
# emerge --ask --oneshot --verbose '>=dev-db/phpmyadmin-'

Risk factor :

High / CVSS Base Score : 8.5
CVSS Temporal Score : 7.4
Public Exploit Available : true

Family: Gentoo Local Security Checks

Nessus Plugin ID: 35964 (gentoo_GLSA-200903-32.nasl)

Bugtraq ID: 32720

CVE ID: CVE-2006-6942

Ready to Amp Up Your Nessus Experience?

Get Nessus Professional to scan unlimited IPs, run compliance checks & more

Buy Nessus Professional Now