PMASA-2010-4
Announcement-ID: PMASA-2010-4
Date: 2010-08-20
Summary
Insufficient output sanitizing when generating configuration file.
Description
The setup script used to generate configuration can be fooled using a crafted POST request to include arbitrary PHP code in generated configuration file. Combined with the ability to save files on the server, this can allow unauthenticated users to execute arbitrary PHP code.
Severity
We consider this vulnerability to be critical.
Mitigation factor
Additional steps from administrator are required to actually exploit this issue (a web server writable config directory has to be created).
Affected Versions
For 2.11.x: versions before 2.11.10.1.
Unaffected Versions
Branch 3.x is not affected by this.
Solution
Upgrade to phpMyAdmin 2.11.10.1 or apply the patch listed below.
References
Thanks to Takeshi Terada of Mitsui Bussan Secure Directions, Inc., who has discovered this issue and reported it to us. See the reported bug for more details.
Assigned CVE IDs: CVE-2010-3055
Patches
The following commits have been made on the 2.11 branch to fix this issue:
More information
For further information and in case of questions, please contact the phpMyAdmin security team at security@phpmyadmin.net.