Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

suse-cvrf логотип

openSUSE-SU-2016:2168-1

Опубликовано: 29 авг. 2016
Источник: suse-cvrf

Описание

Security update for phpMyAdmin

phpMyAdmin was updated to version 4.4.15.8 (2016-08-16) to fix the following issues:

  • Upstream changelog for 4.4.15.8:
    • Improve session cookie code for openid.php and signon.php example files
    • Full path disclosure in openid.php and signon.php example files
    • Unsafe generation of BlowfishSecret (when not supplied by the user)
    • Referrer leak when phpinfo is enabled
    • Use HTTPS for wiki links
    • Improve SSL certificate handling
    • Fix full path disclosure in debugging code
    • Administrators could trigger SQL injection attack against users
  • other fixes
    • Remove Swekey support
  • Security fixes: https://www.phpmyadmin.net/security/
    • Weaknesses with cookie encryption see PMASA-2016-29 (CVE-2016-6606, CWE-661)
    • Multiple XSS vulnerabilities see PMASA-2016-30 (CVE-2016-6607, CWE-661)
    • Multiple XSS vulnerabilities see PMASA-2016-31 (CVE-2016-6608, CWE-661)
    • PHP code injection see PMASA-2016-32 (CVE-2016-6609, CWE-661)
    • Full path disclosure see PMASA-2016-33 (CVE-2016-6610, CWE-661)
    • SQL injection attack see PMASA-2016-34 (CVE-2016-6611, CWE-661)
    • Local file exposure through LOAD DATA LOCAL INFILE see PMASA-2016-35 (CVE-2016-6612, CWE-661)
    • Local file exposure through symlinks with UploadDir see PMASA-2016-36 (CVE-2016-6613, CWE-661)
    • Path traversal with SaveDir and UploadDir see PMASA-2016-37 (CVE-2016-6614, CWE-661)
    • Multiple XSS vulnerabilities see PMASA-2016-38 (CVE-2016-6615, CWE-661)
    • SQL injection vulnerability as control user see PMASA-2016-39 (CVE-2016-6616, CWE-661)
    • SQL injection vulnerability see PMASA-2016-40 (CVE-2016-6617, CWE-661)
    • Denial-of-service attack through transformation feature see PMASA-2016-41 (CVE-2016-6618, CWE-661)
    • SQL injection vulnerability as control user see PMASA-2016-42 (CVE-2016-6619, CWE-661)
    • Verify data before unserializing see PMASA-2016-43 (CVE-2016-6620, CWE-661)
    • SSRF in setup script see PMASA-2016-44 (CVE-2016-6621, CWE-661)
    • Denial-of-service attack with $cfg['AllowArbitraryServer'] = true and persistent connections see PMASA-2016-45 (CVE-2016-6622, CWE-661)
    • Denial-of-service attack by using for loops see PMASA-2016-46 (CVE-2016-6623, CWE-661)
    • Possible circumvention of IP-based allow/deny rules with IPv6 and proxy server see PMASA-2016-47 (CVE-2016-6624, CWE-661)
    • Detect if user is logged in see PMASA-2016-48 (CVE-2016-6625, CWE-661)
    • Bypass URL redirection protection see PMASA-2016-49 (CVE-2016-6626, CWE-661)
    • Referrer leak see PMASA-2016-50 (CVE-2016-6627, CWE-661)
    • Reflected File Download see PMASA-2016-51 (CVE-2016-6628, CWE-661)
    • ArbitraryServerRegexp bypass see PMASA-2016-52 (CVE-2016-6629, CWE-661)
    • Denial-of-service attack by entering long password see PMASA-2016-53 (CVE-2016-6630, CWE-661)
    • Remote code execution vulnerability when running as CGI see PMASA-2016-54 (CVE-2016-6631, CWE-661)
    • Denial-of-service attack when PHP uses dbase extension see PMASA-2016-55 (CVE-2016-6632, CWE-661)
    • Remove tode execution vulnerability when PHP uses dbase extension see PMASA-2016-56 (CVE-2016-6633, CWE-661)

Список пакетов

openSUSE Leap 42.1
phpMyAdmin-4.4.15.8-25.1

Описание

An issue was discovered in cookie encryption in phpMyAdmin. The decryption of the username/password is vulnerable to a padding oracle attack. This can allow an attacker who has access to a user's browser cookie file to decrypt the username and password. Furthermore, the same initialization vector (IV) is used to hash the username and password stored in the phpMyAdmin cookie. If a user has the same password as their username, an attacker who examines the browser cookie can see that they are the same - but the attacker can not directly decode these values from the cookie as it is still hashed. All 4.6.x versions (prior to 4.6.4), 4.4.x versions (prior to 4.4.15.8), and 4.0.x versions (prior to 4.0.10.17) are affected.


Затронутые продукты
openSUSE Leap 42.1:phpMyAdmin-4.4.15.8-25.1

Ссылки

Описание

XSS issues were discovered in phpMyAdmin. This affects Zoom search (specially crafted column content can be used to trigger an XSS attack); GIS editor (certain fields in the graphical GIS editor are not properly escaped and can be used to trigger an XSS attack); Relation view; the following Transformations: Formatted, Imagelink, JPEG: Upload, RegexValidation, JPEG inline, PNG inline, and transformation wrapper; XML export; MediaWiki export; Designer; When the MySQL server is running with a specially-crafted log_bin directive; Database tab; Replication feature; and Database search. All 4.6.x versions (prior to 4.6.4), 4.4.x versions (prior to 4.4.15.8), and 4.0.x versions (prior to 4.0.10.17) are affected.


Затронутые продукты
openSUSE Leap 42.1:phpMyAdmin-4.4.15.8-25.1

Ссылки

Описание

XSS issues were discovered in phpMyAdmin. This affects the database privilege check and the "Remove partitioning" functionality. Specially crafted database names can trigger the XSS attack. All 4.6.x versions (prior to 4.6.4) are affected.


Затронутые продукты
openSUSE Leap 42.1:phpMyAdmin-4.4.15.8-25.1

Ссылки

Описание

An issue was discovered in phpMyAdmin. A specially crafted database name could be used to run arbitrary PHP commands through the array export feature. All 4.6.x versions (prior to 4.6.4), 4.4.x versions (prior to 4.4.15.8), and 4.0.x versions (prior to 4.0.10.17) are affected.


Затронутые продукты
openSUSE Leap 42.1:phpMyAdmin-4.4.15.8-25.1

Ссылки

Описание

A full path disclosure vulnerability was discovered in phpMyAdmin where a user can trigger a particular error in the export mechanism to discover the full path of phpMyAdmin on the disk. All 4.6.x versions (prior to 4.6.4), 4.4.x versions (prior to 4.4.15.8), and 4.0.x versions (prior to 4.0.10.17) are affected.


Затронутые продукты
openSUSE Leap 42.1:phpMyAdmin-4.4.15.8-25.1

Ссылки

Описание

An issue was discovered in phpMyAdmin. A specially crafted database and/or table name can be used to trigger an SQL injection attack through the export functionality. All 4.6.x versions (prior to 4.6.4), 4.4.x versions (prior to 4.4.15.8), and 4.0.x versions (prior to 4.0.10.17) are affected.


Затронутые продукты
openSUSE Leap 42.1:phpMyAdmin-4.4.15.8-25.1

Ссылки

Описание

An issue was discovered in phpMyAdmin. A user can exploit the LOAD LOCAL INFILE functionality to expose files on the server to the database system. All 4.6.x versions (prior to 4.6.4), 4.4.x versions (prior to 4.4.15.8), and 4.0.x versions (prior to 4.0.10.17) are affected.


Затронутые продукты
openSUSE Leap 42.1:phpMyAdmin-4.4.15.8-25.1

Ссылки

Описание

An issue was discovered in phpMyAdmin. A user can specially craft a symlink on disk, to a file which phpMyAdmin is permitted to read but the user is not, which phpMyAdmin will then expose to the user. All 4.6.x versions (prior to 4.6.4), 4.4.x versions (prior to 4.4.15.8), and 4.0.x versions (prior to 4.0.10.17) are affected.


Затронутые продукты
openSUSE Leap 42.1:phpMyAdmin-4.4.15.8-25.1

Ссылки

Описание

An issue was discovered in phpMyAdmin involving the %u username replacement functionality of the SaveDir and UploadDir features. When the username substitution is configured, a specially-crafted user name can be used to circumvent restrictions to traverse the file system. All 4.6.x versions (prior to 4.6.4), 4.4.x versions (prior to 4.4.15.8), and 4.0.x versions (prior to 4.0.10.17) are affected.


Затронутые продукты
openSUSE Leap 42.1:phpMyAdmin-4.4.15.8-25.1

Ссылки

Описание

XSS issues were discovered in phpMyAdmin. This affects navigation pane and database/table hiding feature (a specially-crafted database name can be used to trigger an XSS attack); the "Tracking" feature (a specially-crafted query can be used to trigger an XSS attack); and GIS visualization feature. All 4.6.x versions (prior to 4.6.4) and 4.4.x versions (prior to 4.4.15.8) are affected.


Затронутые продукты
openSUSE Leap 42.1:phpMyAdmin-4.4.15.8-25.1

Ссылки

Описание

An issue was discovered in phpMyAdmin. In the "User group" and "Designer" features, a user can execute an SQL injection attack against the account of the control user. All 4.6.x versions (prior to 4.6.4) and 4.4.x versions (prior to 4.4.15.8) are affected.


Затронутые продукты
openSUSE Leap 42.1:phpMyAdmin-4.4.15.8-25.1

Ссылки

Описание

An issue was discovered in phpMyAdmin. A specially crafted database and/or table name can be used to trigger an SQL injection attack through the export functionality. All 4.6.x versions (prior to 4.6.4) are affected.


Затронутые продукты
openSUSE Leap 42.1:phpMyAdmin-4.4.15.8-25.1

Ссылки

Описание

An issue was discovered in phpMyAdmin. The transformation feature allows a user to trigger a denial-of-service (DoS) attack against the server. All 4.6.x versions (prior to 4.6.4), 4.4.x versions (prior to 4.4.15.8), and 4.0.x versions (prior to 4.0.10.17) are affected.


Затронутые продукты
openSUSE Leap 42.1:phpMyAdmin-4.4.15.8-25.1

Ссылки

Описание

An issue was discovered in phpMyAdmin. In the user interface preference feature, a user can execute an SQL injection attack against the account of the control user. All 4.6.x versions (prior to 4.6.4), 4.4.x versions (prior to 4.4.15.8), and 4.0.x versions (prior to 4.0.10.17) are affected.


Затронутые продукты
openSUSE Leap 42.1:phpMyAdmin-4.4.15.8-25.1

Ссылки

Описание

An issue was discovered in phpMyAdmin. Some data is passed to the PHP unserialize() function without verification that it's valid serialized data. The unserialization can result in code execution because of the interaction with object instantiation and autoloading. All 4.6.x versions (prior to 4.6.4), 4.4.x versions (prior to 4.4.15.8), and 4.0.x versions (prior to 4.0.10.17) are affected.


Затронутые продукты
openSUSE Leap 42.1:phpMyAdmin-4.4.15.8-25.1

Ссылки

Описание

The setup script for phpMyAdmin before 4.0.10.19, 4.4.x before 4.4.15.10, and 4.6.x before 4.6.6 allows remote attackers to conduct server-side request forgery (SSRF) attacks via unspecified vectors.


Затронутые продукты
openSUSE Leap 42.1:phpMyAdmin-4.4.15.8-25.1

Ссылки

Описание

An issue was discovered in phpMyAdmin. An unauthenticated user is able to execute a denial-of-service (DoS) attack by forcing persistent connections when phpMyAdmin is running with $cfg['AllowArbitraryServer']=true. All 4.6.x versions (prior to 4.6.4), 4.4.x versions (prior to 4.4.15.8), and 4.0.x versions (prior to 4.0.10.17) are affected.


Затронутые продукты
openSUSE Leap 42.1:phpMyAdmin-4.4.15.8-25.1

Ссылки

Описание

An issue was discovered in phpMyAdmin. An authorized user can cause a denial-of-service (DoS) attack on a server by passing large values to a loop. All 4.6.x versions (prior to 4.6.4), 4.4.x versions (prior to 4.4.15.8), and 4.0.x versions (prior to 4.0.10.17) are affected.


Затронутые продукты
openSUSE Leap 42.1:phpMyAdmin-4.4.15.8-25.1

Ссылки

Описание

An issue was discovered in phpMyAdmin involving improper enforcement of the IP-based authentication rules. When phpMyAdmin is used with IPv6 in a proxy server environment, and the proxy server is in the allowed range but the attacking computer is not allowed, this vulnerability can allow the attacking computer to connect despite the IP rules. All 4.6.x versions (prior to 4.6.4), 4.4.x versions (prior to 4.4.15.8), and 4.0.x versions (prior to 4.0.10.17) are affected.


Затронутые продукты
openSUSE Leap 42.1:phpMyAdmin-4.4.15.8-25.1

Ссылки

Описание

An issue was discovered in phpMyAdmin. An attacker can determine whether a user is logged in to phpMyAdmin. The user's session, username, and password are not compromised by this vulnerability. All 4.6.x versions (prior to 4.6.4), 4.4.x versions (prior to 4.4.15.8), and 4.0.x versions (prior to 4.0.10.17) are affected.


Затронутые продукты
openSUSE Leap 42.1:phpMyAdmin-4.4.15.8-25.1

Ссылки

Описание

An issue was discovered in phpMyAdmin. An attacker could redirect a user to a malicious web page. All 4.6.x versions (prior to 4.6.4), 4.4.x versions (prior to 4.4.15.8), and 4.0.x versions (prior to 4.0.10.17) are affected.


Затронутые продукты
openSUSE Leap 42.1:phpMyAdmin-4.4.15.8-25.1

Ссылки

Описание

An issue was discovered in phpMyAdmin. An attacker can determine the phpMyAdmin host location through the file url.php. All 4.6.x versions (prior to 4.6.4), 4.4.x versions (prior to 4.4.15.8), and 4.0.x versions (prior to 4.0.10.17) are affected.


Затронутые продукты
openSUSE Leap 42.1:phpMyAdmin-4.4.15.8-25.1

Ссылки

Описание

An issue was discovered in phpMyAdmin. An attacker may be able to trigger a user to download a specially crafted malicious SVG file. All 4.6.x versions (prior to 4.6.4), 4.4.x versions (prior to 4.4.15.8), and 4.0.x versions (prior to 4.0.10.17) are affected.


Затронутые продукты
openSUSE Leap 42.1:phpMyAdmin-4.4.15.8-25.1

Ссылки

Описание

An issue was discovered in phpMyAdmin involving the $cfg['ArbitraryServerRegexp'] configuration directive. An attacker could reuse certain cookie values in a way of bypassing the servers defined by ArbitraryServerRegexp. All 4.6.x versions (prior to 4.6.4), 4.4.x versions (prior to 4.4.15.8), and 4.0.x versions (prior to 4.0.10.17) are affected.


Затронутые продукты
openSUSE Leap 42.1:phpMyAdmin-4.4.15.8-25.1

Ссылки

Описание

An issue was discovered in phpMyAdmin. An authenticated user can trigger a denial-of-service (DoS) attack by entering a very long password at the change password dialog. All 4.6.x versions (prior to 4.6.4), 4.4.x versions (prior to 4.4.15.8), and 4.0.x versions (prior to 4.0.10.17) are affected.


Затронутые продукты
openSUSE Leap 42.1:phpMyAdmin-4.4.15.8-25.1

Ссылки

Описание

An issue was discovered in phpMyAdmin. A user can execute a remote code execution attack against a server when phpMyAdmin is being run as a CGI application. Under certain server configurations, a user can pass a query string which is executed as a command-line argument by the file generator_plugin.sh. All 4.6.x versions (prior to 4.6.4), 4.4.x versions (prior to 4.4.15.8), and 4.0.x versions (prior to 4.0.10.17) are affected.


Затронутые продукты
openSUSE Leap 42.1:phpMyAdmin-4.4.15.8-25.1

Ссылки

Описание

An issue was discovered in phpMyAdmin where, under certain conditions, phpMyAdmin may not delete temporary files during the import of ESRI files. All 4.6.x versions (prior to 4.6.4), 4.4.x versions (prior to 4.4.15.8), and 4.0.x versions (prior to 4.0.10.17) are affected.


Затронутые продукты
openSUSE Leap 42.1:phpMyAdmin-4.4.15.8-25.1

Ссылки

Описание

An issue was discovered in phpMyAdmin. phpMyAdmin can be used to trigger a remote code execution attack against certain PHP installations that are running with the dbase extension. All 4.6.x versions (prior to 4.6.4), 4.4.x versions (prior to 4.4.15.8), and 4.0.x versions (prior to 4.0.10.17) are affected.


Затронутые продукты
openSUSE Leap 42.1:phpMyAdmin-4.4.15.8-25.1

Ссылки
Уязвимость openSUSE-SU-2016:2168-1