FreeBSD : phpmyadmin -- multiple vulnerabilities (ef70b201-645d-11e6-9cdc-6805ca0b3d42)

This script is Copyright (C) 2016-2017 Tenable Network Security, Inc.


Synopsis :

The remote FreeBSD host is missing a security-related update.

Description :

The phpmyadmin development team reports :

Weakness with cookie encryption

Multiple XSS vulnerabilities

Multiple XSS vulnerabilities

PHP code injection

Full path disclosure

SQL injection attack

Local file exposure

Local file exposure through symlinks with UploadDir

Path traversal with SaveDir and UploadDir

Multiple XSS vulnerabilities

SQL injection attack

SQL injection attack

Denial of service (DOS) attack in transformation feature

SQL injection attack as control user

Unvalidated data passed to unserialize()

DOS attack with forced persistent connections

Denial of service (DOS) attack by for loops

IPv6 and proxy server IP-based authentication rule circumvention

Detect if user is logged in

Bypass URL redirect protection

Referrer leak in url.php

Reflected File Download attack

ArbitraryServerRegexp bypass

Denial of service (DOS) attack by changing password to a very long
string

Remote code execution vulnerability when run as CGI Summary Denial of
service (DOS) attack with dbase extension

Remote code execution vulnerability when PHP is running with dbase
extension

See also :

https://www.phpmyadmin.net/security/PMASA-2016-29/
https://www.phpmyadmin.net/security/PMASA-2016-30/
https://www.phpmyadmin.net/security/PMASA-2016-31/
https://www.phpmyadmin.net/security/PMASA-2016-32/
https://www.phpmyadmin.net/security/PMASA-2016-33/
https://www.phpmyadmin.net/security/PMASA-2016-34/
https://www.phpmyadmin.net/security/PMASA-2016-35/
https://www.phpmyadmin.net/security/PMASA-2016-36/
https://www.phpmyadmin.net/security/PMASA-2016-37/
https://www.phpmyadmin.net/security/PMASA-2016-38/
https://www.phpmyadmin.net/security/PMASA-2016-39/
https://www.phpmyadmin.net/security/PMASA-2016-40/
https://www.phpmyadmin.net/security/PMASA-2016-41/
https://www.phpmyadmin.net/security/PMASA-2016-42/
https://www.phpmyadmin.net/security/PMASA-2016-43/
https://www.phpmyadmin.net/security/PMASA-2016-45/
https://www.phpmyadmin.net/security/PMASA-2016-46/
https://www.phpmyadmin.net/security/PMASA-2016-47/
https://www.phpmyadmin.net/security/PMASA-2016-48/
https://www.phpmyadmin.net/security/PMASA-2016-49/
https://www.phpmyadmin.net/security/PMASA-2016-50/
https://www.phpmyadmin.net/security/PMASA-2016-51/
https://www.phpmyadmin.net/security/PMASA-2016-52/
https://www.phpmyadmin.net/security/PMASA-2016-53/
https://www.phpmyadmin.net/security/PMASA-2016-54/
https://www.phpmyadmin.net/security/PMASA-2016-55/
https://www.phpmyadmin.net/security/PMASA-2016-56/
http://www.nessus.org/u?de3bd02a

Solution :

Update the affected package.

Risk factor :

Critical / CVSS Base Score : 10.0
(CVSS2#AV:N/AC:L/Au:N/C:C/I:C/A:C)