FreeBSD : phpMyAdmin -- bypass 'no password' restriction (68611303-149e-11e7-b9bb-6805ca0b3d42)

This script is Copyright (C) 2017 Tenable Network Security, Inc.


Synopsis :

The remote FreeBSD host is missing a security-related update.

Description :

The phpMyAdmin team reports : Summary Bypass
$cfg['Servers'][$i]['AllowNoPassword'] Description A vulnerability was
discovered where the restrictions caused by
$cfg['Servers'][$i]['AllowNoPassword'] = false are bypassed under
certain PHP versions. This can allow the login of users who have no
password set even if the administrator has set
$cfg['Servers'][$i]['AllowNoPassword'] to false (which is also the
default).

This behavior depends on the PHP version used (it seems PHP 5 is
affected, while PHP 7.0 is not). Severity We consider this
vulnerability to be of moderate severity. Mitigation factor Set a
password for all users.

See also :

https://www.phpmyadmin.net/security/PMASA-2017-8/
http://www.nessus.org/u?a3653797

Solution :

Update the affected package.

Risk factor :

High

Family: FreeBSD Local Security Checks

Nessus Plugin ID: 99060 ()

Bugtraq ID:

CVE ID:

Ready to Amp Up Your Nessus Experience?

Get Nessus Professional to scan unlimited IPs, run compliance checks & more

Buy Nessus Professional Now