Vulnerability   
Search   
    Search 324607 CVE descriptions
and 145615 test descriptions,
access 10,000+ cross references.
Tests   CVE   All  

Test ID:1.3.6.1.4.1.25623.1.0.831522
Category:Mandrake Local Security Checks
Title:Mandriva Update for phpmyadmin MDVSA-2011:198 (phpmyadmin)
Summary:The remote host is missing an update for the 'phpmyadmin'; package(s) announced via the referenced advisory.
Description:Summary:
The remote host is missing an update for the 'phpmyadmin'
package(s) announced via the referenced advisory.

Vulnerability Insight:
Multiple vulnerabilities has been found and corrected in phpmyadmin:

Importing a specially-crafted XML file which contains an XML entity
injection permits to retrieve a local file (limited by the privileges
of the user running the web server) (CVE-2011-4107).

Using crafted database names, it was possible to produce XSS in the
Database Synchronize and Database rename panels. Using an invalid
and crafted SQL query, it was possible to produce XSS when editing
a query on a table overview panel or when using the view creation
dialog. Using a crafted column type, it was possible to produce XSS
in the table search and create index dialogs (CVE-2011-4634).

Crafted values entered in the setup interface can produce XSS. Also,
if the config directory exists and is writeable, the XSS payload can
be saved to this directory (CVE-2011-4782).

Using crafted url parameters, it was possible to produce XSS
on the export panels in the server, database and table sections
(CVE-2011-4780).

This upgrade provides the latest phpmyadmin version (3.4.9) to address
these vulnerabilities.

Affected Software/OS:
phpmyadmin on Mandriva Enterprise Server 5,
Mandriva Enterprise Server 5/X86_64

Solution:
Please Install the Updated Packages.

CVSS Score:
4.3

CVSS Vector:
AV:N/AC:M/Au:N/C:N/I:P/A:N

Cross-Ref: Common Vulnerability Exposure (CVE) ID: CVE-2011-4107
20111102 PhpMyAdmin Arbitrary File Reading
http://seclists.org/fulldisclosure/2011/Nov/21
46447
http://secunia.com/advisories/46447
50497
http://www.securityfocus.com/bid/50497
76798
http://osvdb.org/76798
8533
http://securityreason.com/securityalert/8533
DSA-2391
http://www.debian.org/security/2012/dsa-2391
FEDORA-2011-15831
http://lists.fedoraproject.org/pipermail/package-announce/2011-November/069649.html
FEDORA-2011-15841
http://lists.fedoraproject.org/pipermail/package-announce/2011-November/069625.html
FEDORA-2011-15846
http://lists.fedoraproject.org/pipermail/package-announce/2011-November/069635.html
MDVSA-2011:198
http://www.mandriva.com/security/advisories?name=MDVSA-2011:198
[oss-security] 20111103 CVE Request -- phpMyAdmin -- Arbitrary local file read flaw by loading XML strings / importing XML files
http://www.openwall.com/lists/oss-security/2011/11/03/3
[oss-security] 20111103 Re: CVE Request -- phpMyAdmin -- Arbitrary local file read flaw by loading XML strings / importing XML files
http://www.openwall.com/lists/oss-security/2011/11/03/5
http://packetstormsecurity.org/files/view/106511/phpmyadmin-fileread.txt
http://www.phpmyadmin.net/home_page/security/PMASA-2011-17.php
http://www.wooyun.org/bugs/wooyun-2010-03185
https://bugzilla.redhat.com/show_bug.cgi?id=751112
phpmyadmin-xml-info-disclosure(71108)
https://exchange.xforce.ibmcloud.com/vulnerabilities/71108
Common Vulnerability Exposure (CVE) ID: CVE-2011-4634
http://lists.fedoraproject.org/pipermail/package-announce/2011-December/071040.html
Common Vulnerability Exposure (CVE) ID: CVE-2011-4782
http://lists.fedoraproject.org/pipermail/package-announce/2012-January/071537.html
http://lists.fedoraproject.org/pipermail/package-announce/2012-January/071523.html
XForce ISS Database: phpmyadmin-configfileclass-xss(71938)
https://exchange.xforce.ibmcloud.com/vulnerabilities/71938
Common Vulnerability Exposure (CVE) ID: CVE-2011-4780
BugTraq ID: 51226
http://www.securityfocus.com/bid/51226
CopyrightCopyright (C) 2012 Greenbone AG

This is only one of 145615 vulnerability tests in our test suite. Find out more about running a complete security audit.

To run a free test of this vulnerability against your system, register below.




© 1998-2025 E-Soft Inc. All rights reserved.