FreeBSD : phpmyadmin -- SQL injection vulnerability (ce2f2ade-e7df-11dc-a701-000bcdc1757a)
Medium Nessus Plugin ID 31377
SynopsisThe remote FreeBSD host is missing a security-related update.
DescriptionA phpMyAdmin security announcement report :
phpMyAdmin used the $_REQUEST superglobal as a source for its parameters, instead of $_GET and $_POST. This means that on most servers, a cookie with the same name as one of phpMyAdmin's parameters can interfere.
Another application could set a cookie for the root path '/' with a 'sql_query' name, therefore overriding the user-submitted sql_query because by default, the $_REQUEST superglobal imports first GET, then POST then COOKIE data. Mitigation factor An attacker must trick the victim into visiting a page on the same web server where he has placed code that creates a malicious cookie.
SolutionUpdate the affected package.