Bringing MySQL to the web

PMASA-2009-4

Announcement-ID: PMASA-2009-4

Date: 2009-04-14

Summary

Insufficient output sanitizing when generating configuration file.

Description

Setup script used to generate configuration can be fooled using a crafted POST request to include arbitrary PHP code in generated configuration file. Combined with ability to save files on server, this can allow unauthenticated users to execute arbitrary PHP code. This issue is on different parameters than PMASA-2009-3 and it was missed out of our radar because it was not existing in 2.11.x branch.

Severity

We consider this vulnerability to be critical.

Mitigation factor

Additional steps from administrator are required to actually exploit this issue (web server writable config directory has to be created).

Affected Versions

For 2.11.x: versions are not affected.<br /> For 3.x: versions before 3.1.3.2.<br />

Solution

Upgrade to phpMyAdmin 3.1.3.2 or apply patches listed below.

References

Thanks to Tenable Network Security, who have discovered this issue and reported it to us.

Assigned CVE ids: CVE-2009-1285

CWE ids: CWE-661 CWE-116

Patches

The following commits have been made to fix this issue:

More information

For further information and in case of questions, please contact the phpMyAdmin team. Our website is phpmyadmin.net.