FreeBSD : phpmyadmin -- multiple vulnerabilities (d79fc873-b5f9-11e0-89b4-001ec9578670)

This script is Copyright (C) 2011-2013 Tenable Network Security, Inc.


Synopsis :

The remote FreeBSD host is missing a security-related update.

Description :

The phpMyAdmin development team reports :

XSS in table Print view.

Via a crafted MIME-type transformation parameter, an attacker can
perform a local file inclusion.

In the 'relational schema' code a parameter was not sanitized before
being used to concatenate a class name.

The end result is a local file inclusion vulnerability and code
execution.

It was possible to manipulate the PHP session superglobal using some
of the Swekey authentication code.

This is very similar to PMASA-2011-5, documented in
7e4e5c53-a56c-11e0-b180-00216aa06fc2

See also :

http://www.phpmyadmin.net/home_page/security/PMASA-2011-9.php
http://www.phpmyadmin.net/home_page/security/PMASA-2011-10.php
http://www.phpmyadmin.net/home_page/security/PMASA-2011-11.php
http://www.phpmyadmin.net/home_page/security/PMASA-2011-12.php
http://www.nessus.org/u?4045bb5f

Solution :

Update the affected package.

Risk factor :

Medium / CVSS Base Score : 6.8
(CVSS2#AV:N/AC:M/Au:N/C:P/I:P/A:P)

Family: FreeBSD Local Security Checks

Nessus Plugin ID: 55682 ()

Bugtraq ID:

CVE ID: CVE-2011-2642
CVE-2011-2643

Ready to Amp Up Your Nessus Experience?

Get Nessus Professional to scan unlimited IPs, run compliance checks & more

Buy Nessus Professional Now