phpMyAdmin *sort_by* PHP Code Execution

Posted on Tuesday, September 16, 2008 @ 18:47:54 CDT in Security
by Raven

SECUNIA ADVISORY ID: SA31884

VERIFY ADVISORY: http://secunia.com/advisories/31884/

CRITICAL: Moderately critical

IMPACT: System access

SOFTWARE: phpMyAdmin 2.x - http://secunia.com/advisories/product/1720/

DESCRIPTION: Norman Hippert has reported a vulnerability in phpMyAdmin, which can be exploited by malicious users to compromise a vulnerable system. The vulnerability is reported in all versions prior to 2.11.9.1.

Input passed to the "sort_by" parameter in server_databases.php is not properly sanitised before being used. This can be exploited to execute arbitrary PHP code. Successful exploitation requires valid user credentials.

SOLUTION: Update to version 2.11.9.1.

PROVIDED AND/OR DISCOVERED BY: Norman Hippert

ORIGINAL ADVISORY: PMASA-2008-7: http://www.phpmyadmin.net/home_page/security.php?issue=PMASA-2008-7

Norman Hippert: http://fd.the-wildcat.de/pma_e36a091q11.php
 
 
click Related        click Share
 
 
Associated Topics

phpMyAdmin
 
News ©

Site Info

Last SeenLast Seen
  • vashd1
  • neralex
Server TrafficServer Traffic
  • Total: 513,542,129
  • Today: 134,961
Server InfoServer Info
  • Apr 25, 2025
  • 11:31 pm CDT