CVE-2009-1148
https://notcve.org/view.php?id=CVE-2009-1148
Directory traversal vulnerability in bs_disp_as_mime_type.php in the BLOB streaming feature in phpMyAdmin before 3.1.3.1 allows remote attackers to read arbitrary files via directory traversal sequences in the file_path parameter ($filename variable). Vulnerabilidad de salto de directorio en el archivo bs_disp_as_mime_type.php en la característica BLOB streaming en phpMyAdmin anteriores a 3.1.3.1 que permite a los atacantes remotos leer arbitrariamente archivo a través de secuencias de salto de directorio en el parámetro file_path (variable $filename). • http://lists.opensuse.org/opensuse-security-announce/2009-04/msg00003.html http://phpmyadmin.svn.sourceforge.net/viewvc/phpmyadmin/branches/MAINT_3_1_3/phpMyAdmin/bs_disp_as_mime_type.php?r1=12303&r2=12302&pathrev=12303 http://secunia.com/advisories/34468 http://secunia.com/advisories/34642 http://www.phpmyadmin.net/home_page/security/PMASA-2009-1.php • CWE-22: Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') •
CVE-2008-5621 – phpMyAdmin 3.1.0 - Cross-Site Request Forgery / SQL Injection
https://notcve.org/view.php?id=CVE-2008-5621
Cross-site request forgery (CSRF) vulnerability in phpMyAdmin 2.11.x before 2.11.9.4 and 3.x before 3.1.1.0 allows remote attackers to perform unauthorized actions as the administrator via a link or IMG tag to tbl_structure.php with a modified table parameter. NOTE: other unspecified pages are also reachable, but they have the same root cause. NOTE: this can be leveraged to conduct SQL injection attacks and execute arbitrary code. Vulnerabilidad de falsificación de petición en sitios cruzados (CSRF) en phpMyAdmin v2.11.x anterior a v2.11.9.4 y v3.x anterior a v3.1.1.0; permite a atacantes remotos realizar acciones no autorizadas como administrador a través de un enlace o etiqueta IMG a tbl_structure.php con un parámetro "table" (tabla) modificado. NOTA: esto puede ser utilizar para realizar ataques de inyección SQL y ejecutar código arbitrariamente. • https://www.exploit-db.com/exploits/7382 http://lists.opensuse.org/opensuse-security-announce/2009-02/msg00000.html http://osvdb.org/50894 http://secunia.com/advisories/33076 http://secunia.com/advisories/33146 http://secunia.com/advisories/33246 http://secunia.com/advisories/33822 http://secunia.com/advisories/33912 http://security.gentoo.org/glsa/glsa-200903-32.xml http://securityreason.com/securityalert/4753 http://typo3.org/teams/security/security-bulletins/typo3-20081222-1 • CWE-352: Cross-Site Request Forgery (CSRF) •
CVE-2008-4775 – phpMyAdmin 3.0.1 - 'pmd_pdf.php' Cross-Site Scripting
https://notcve.org/view.php?id=CVE-2008-4775
Cross-site scripting (XSS) vulnerability in pmd_pdf.php in phpMyAdmin 3.0.0, and possibly other versions including 2.11.9.2 and 3.0.1, when register_globals is enabled, allows remote attackers to inject arbitrary web script or HTML via the db parameter, a different vector than CVE-2006-6942 and CVE-2007-5977. Vulnerabilidad de secuencias de comandos en sitios cruzados (XSS) en pmd_pdf.php en phpMyAdmin v3.0.0, y posiblemente otras versiones incluyendo v2.11.9.2 y v3.0.1, cuando register_globals está activo, permite a atacantes remotos inyectar web script o HTML a través del parámetro "db", un vector diferente a CVE-2006-6942 y CVE-2007-5977. • https://www.exploit-db.com/exploits/32531 http://secunia.com/advisories/32449 http://secunia.com/advisories/32482 http://security.gentoo.org/glsa/glsa-200903-32.xml http://securityreason.com/securityalert/4516 http://www.securityfocus.com/archive/1/497815/100/0/threaded http://www.securityfocus.com/bid/31928 http://www.vupen.com/english/advisories/2008/2943 https://exchange.xforce.ibmcloud.com/vulnerabilities/46136 https://www.redhat.com/archives/fedora-package-announce/2008-October • CWE-79: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') •
CVE-2008-4326
https://notcve.org/view.php?id=CVE-2008-4326
The PMA_escapeJsString function in libraries/js_escape.lib.php in phpMyAdmin before 2.11.9.2, when Internet Explorer is used, allows remote attackers to bypass cross-site scripting (XSS) protection mechanisms and conduct XSS attacks via a NUL byte inside a "</script" sequence. La función PMA_escapeJsString de libraries/js_escape.lib.php de phpMyAdmin antes de v2.11.9.2, al usar Internet Explorer, permite a usuarios remotos evitar los mecanismos de protección contra la ejecución de secuencias de comandos en sitios cruzados (XSS) y llevar a cabo ataques XSS a través de un byte NULL dentro de una sentencia "</script". • http://jvn.jp/en/jp/JVN54824688/index.html http://jvndb.jvn.jp/ja/contents/2008/JVNDB-2008-000061.html http://lists.opensuse.org/opensuse-security-announce/2009-02/msg00000.html http://osvdb.org/48511 http://phpmyadmin.svn.sourceforge.net/viewvc/phpmyadmin/branches/MAINT_2_11_9/phpMyAdmin/libraries/js_escape.lib.php?r1=11514&r2=11603&pathrev=11603 http://phpmyadmin.svn.sourceforge.net/viewvc/phpmyadmin/branches/QA_2_11/phpMyAdmin/libraries/js_escape.lib.php?view=log&pathrev=11603 http: • CWE-79: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') •
CVE-2008-4096 – phpMyAdmin 3.2 - 'server_databases.php' Remote Command Execution
https://notcve.org/view.php?id=CVE-2008-4096
libraries/database_interface.lib.php in phpMyAdmin before 2.11.9.1 allows remote authenticated users to execute arbitrary code via a request to server_databases.php with a sort_by parameter containing PHP sequences, which are processed by create_function. libraries/database_interface.lib.php en phpMyAdmin anterior a 2.11.9.1, permite a usuarios autenticados en remoto ejecutar código de su elección a través de una solicitud a server_databases.php con un parámetro sort_by que contenga secuencias PHP que son procesadas por create_function. • https://www.exploit-db.com/exploits/32383 http://fd.the-wildcat.de/pma_e36a091q11.php http://lists.opensuse.org/opensuse-security-announce/2009-02/msg00000.html http://osvdb.org/48196 http://secunia.com/advisories/31884 http://secunia.com/advisories/31918 http://secunia.com/advisories/32034 http://secunia.com/advisories/33822 http://security.gentoo.org/glsa/glsa-200903-32.xml http://typo3.org/teams/security/security-bulletins/typo3-20080916-1 http://www.debian.org/securit • CWE-20: Improper Input Validation •