[arch-security] [ASA-201606-25] phpmyadmin: multiple issues
Jelle van der Waa
jelle at archlinux.org
Sat Jun 25 19:50:44 UTC 2016
Arch Linux Security Advisory ASA-201606-25
==========================================
Severity: High
Date : 2016-06-25
CVE-ID : CVE-2016-5701 CVE-2016-5702 CVE-2016-5703 CVE-2016-5704
CVE-2016-5705 CVE-2016-5706 CVE-2016-5730 CVE-2016-5731
CVE-2016-5732 CVE-2016-5732 CVE-2016-5733 CVE-2016-5739
Package : phpmyadmin
Type : multiple issues
Remote : Yes
Link : https://wiki.archlinux.org/index.php/CVE
Summary
=======
The package phpmyadmin before version 4.6.3-1 is vulnerable to multiple
issues.
Resolution
==========
Upgrade to 4.6.3-1.
# pacman -Syu "phpmyadmin>=4.6.3-1"
The problems have been fixed upstream in version 4.6.3.
Workaround
==========
None.
Description
===========
- CVE-2016-5702 (cookie attribute injection)
A vulnerability was found where, under some circumstances, an attacker
can inject arbitrary values in the browser cookies.
Only affected when PHP_SELF is not set.
- CVE-2016-5703 (SQL injection)
A vulnerability was discovered that allows an SQL injection attack to
run arbitrary commands as the control user.
This attack requires a controluser to exist and be configured in
`config.inc.php`, therefore the attack can be mitigated by temporarily
disabling the controluser.
- CVE-2016-5704 (cross-side scripting)
An cross-side scripting vulnerability was discovered on the table
structure page
- CVE-2016-5705 (cross-side scripting)
* An cross-side scripting vulnerability was discovered on the user
privileges page.
* An cross-side scripting vulnerability was discovered in the error
console.
* An cross-side scripting vulnerability was discovered in the central
columns feature.
* An cross-side scripting vulnerability was discovered in the
query bookmarks feature.
* An cross-side scripting vulnerability was discovered in the user
groups feature.
- CVE-2016-5706 (denial of service)
A Denial Of Service (DOS) attack was discovered in the way phpMyAdmin
loads some JavaScript files.
- CVE-2016-5730 (information disclosure)
By specially crafting requests in the following areas, it is possible
to trigger phpMyAdmin to display a PHP error message which contains the
full path of the directory where phpMyAdmin is installed.
1. Setup script 2. Example OpenID authentication script
To mitigate these issues, it is possible to remove the setup script and
examples subdirectories: ./setup/ and ./examples/.
- CVE-2016-5731 (cross-side scripting)
With a specially crafted request, it is possible to trigger an
cross-side scripting attack through the example OpenID authentication
script.
Only affected when the default php.ini is changed and set html_errors = Off.
- CVE-2016-5732 (cross-side scripting)
A vulnerability was reported allowing a specially crafted table
parameters to cause an cross-side scripting attack through the table
structure page.
- CVE-2016-57033 (cross-side scripting)
* A vulnerability was reported allowing a specially crafted table name
to cause an cross-side scripting attack through the functionality to
check database privileges.
* This cross-side scripting doesn't exist in some translations due to
different quotes being used there (eg. Czech).
* A vulnerability was reported allowing a specifically-configured
MySQL server to execute an cross-side scripting attack. This
particular attack requires configuring the MySQL server log_bin
directive with the payload.
* Several cross-side scripting vulnerabilities were found with the
Transformation feature
* Several cross-side scripting vulnerabilities were found in AJAX error
handling
* Several cross-side scripting vulnerabilities were found in the
Designer feature
* An cross-side scripting vulnerability was found in the charts feature
* An cross-side scripting vulnerability was found in the zoom search
feature
- CVE-2016-5739 (information disclosure)
A vulnerability was reported where a specially crafted Transformation
could be used to leak information including the authentication token.
This could be used to direct a CSRF attack against a user.
Impact
======
A remote attacker might be able to access sensitive information, cause
a denial of service, cause a cross-side scripting attack or cause an
SQL injection.
References
==========
https://access.redhat.com/security/cve/CVE-2016-5701
https://access.redhat.com/security/cve/CVE-2016-5702
https://access.redhat.com/security/cve/CVE-2016-5703
https://access.redhat.com/security/cve/CVE-2016-5704
https://access.redhat.com/security/cve/CVE-2016-5705
https://access.redhat.com/security/cve/CVE-2016-5706
https://access.redhat.com/security/cve/CVE-2016-5730
https://access.redhat.com/security/cve/CVE-2016-5731
https://access.redhat.com/security/cve/CVE-2016-5732
https://access.redhat.com/security/cve/CVE-2016-5733
https://access.redhat.com/security/cve/CVE-2016-5739
https://www.phpmyadmin.net/security/PMASA-2016-17/
https://www.phpmyadmin.net/security/PMASA-2016-18/
https://www.phpmyadmin.net/security/PMASA-2016-19/
https://www.phpmyadmin.net/security/PMASA-2016-20/
https://www.phpmyadmin.net/security/PMASA-2016-21/
https://www.phpmyadmin.net/security/PMASA-2016-22/
https://www.phpmyadmin.net/security/PMASA-2016-23/
https://www.phpmyadmin.net/security/PMASA-2016-24/
https://www.phpmyadmin.net/security/PMASA-2016-25/
https://www.phpmyadmin.net/security/PMASA-2016-26/
https://www.phpmyadmin.net/security/PMASA-2016-27/
https://www.phpmyadmin.net/security/PMASA-2016-28/
-------------- next part --------------
A non-text attachment was scrubbed...
Name: signature.asc
Type: application/pgp-signature
Size: 473 bytes
Desc: not available
URL: <https://lists.archlinux.org/pipermail/arch-security/attachments/20160625/ddbec90b/attachment.asc>
More information about the arch-security
mailing list