Summary
Several vulnerabilities have been discovered in phpMyAdmin, a tool to administer MySQL over the web. The Common Vulnerabilities and Exposures project identifies the following problems:
CVE-2013-4995
Authenticated users could inject arbitrary web script or HTML via a crafted SQL query.
CVE-2013-4996
Cross site scripting was possible via a crafted logo URL in the navigation panel or a crafted entry in the Trusted Proxies list.
CVE-2013-5002
Authenticated users could inject arbitrary web script or HTML via a crafted pageNumber value in Schema Export.
CVE-2013-5003Authenticated users could execute arbitrary SQL commands as the phpMyAdmin control user
via the scale parameter PMD PDF
export and the pdf_page_number parameter in Schema Export.
CVE-2014-1879
Authenticated users could inject arbitrary web script or HTML via a crafted file name in the Import function.
Solution
For the stable distribution (wheezy), these problems have been fixed in version 4:3.4.11.1-2+deb7u1.
For the unstable distribution (sid), these problems have been fixed in version 4:4.2.5-1.
We recommend that you upgrade your phpmyadmin packages.
Insight
This package allows administering of MySQL with a web interface.
Affected
phpmyadmin on Debian Linux
Detection
This check tests the installed software version using the apt package manager.
References
Updated on 2015-03-25
Severity
Classification
-
CVE CVE-2013-4995, CVE-2013-4996, CVE-2013-5002, CVE-2013-5003, CVE-2014-1879 -
CVSS Base Score: 6.5
AV:N/AC:L/Au:S/C:P/I:P/A:P
Related Vulnerabilities