The Vigil@nce team watches public vulnerabilities impacting your computers, and then offers security solutions, a database and tools to fix them.

security announce CVE-2007-5386

phpMyAdmin: Cross Site Scripting of setup.php

Synthesis of the vulnerability

An attacker can use parameters of setup.php script in order to inject HTML code in phpMyAdmin.
Severity of this bulletin: 2/4.
Creation date: 11/10/2007.
Références of this threat: 071009a, BID-26020, CVE-2007-5386, DSA-1403-1, FEDORA-2007-2738, FEDORA-2007-3639, MDKSA-2007:199, PMASA-2007-5, VIGILANCE-VUL-7245.
Full Vigil@nce bulletin... (Free trial)

Description of the vulnerability

The phpMyAdmin program is used to administer a MySQL database.

The setup.php script configures the environment. This script does not filter parameters its receives. An attacker can therefore use it to inject Javascript code.

This vulnerability therefore permits an attacker to conduct a Cross Site Scripting attack, when victim is authenticated on phpMyAdmin.
Full Vigil@nce bulletin... (Free trial)

This threat impacts software or systems such as Debian, Fedora, phpMyAdmin.

Our Vigil@nce team determined that the severity of this computer threat is medium.

The trust level is of type confirmed by the editor, with an origin of document.

A proof of concept or an attack tool is available, so your teams have to process this alert. An attacker with a specialist ability can exploit this cybersecurity bulletin.

Solutions for this threat

phpMyAdmin: version
Version is corrected:

Debian: new phpmyadmin packages.
New packages are available:
Debian GNU/Linux 3.1 alias sarge
  Source archives:
      Size/MD5 checksum: 896 6f8e63669094450f8450a808deacff73
      Size/MD5 checksum: 42524 14903fdbe6383e4fa6934e4b955851ec
      Size/MD5 checksum: 2654418 05e33121984824c43d94450af3edf267
  Architecture independent components:
      Size/MD5 checksum: 2770320 b1cfa31fcc29881a78269f38de1387c6
Debian GNU/Linux 4.0 alias etch
  Source archives:
      Size/MD5 checksum: 1011 130531a7ffe3fd67421985abc0d7e3c1
      Size/MD5 checksum: 49749 0ea3fc9730fb32d1587e0757d3fbee25
      Size/MD5 checksum: 3500563 f598509b308bf96aee836eb2338f523c
  Architecture independent components:
      Size/MD5 checksum: 3606276 be23322772089af7b429c01b65fe1469

Fedora 7: new phpMyAdmin packages.
New packages are available:
25f2657507c79e530da135775e8867d55a262149 phpMyAdmin-2.11.2-1.fc7.noarch.rpm
6bb894afbd484c1a6439a93d92ce4e6cc9742387 phpMyAdmin-2.11.2-1.fc7.src.rpm

Fedora 8: new phpMyAdmin packages.
New packages are available:
715750b2c76d697316213a852f9bb26f6e42cd70 phpMyAdmin-
cf8a11215428918585de1f71585c3896e8bd9b49 phpMyAdmin-

Mandriva Linux Corporate 4.0: new phpMyAdmin packages.
New packages are available:
 Corporate 4.0:
 1615938a8fb39ea6af326c8c82865be9 corporate/4.0/i586/phpMyAdmin-
 b85026949e4db3234873cef96d7c7aa0 corporate/4.0/SRPMS/phpMyAdmin-
 Corporate 4.0/X86_64:
 883eca31e1d12d5d13ac860f9bec4111 corporate/4.0/x86_64/phpMyAdmin-
 b85026949e4db3234873cef96d7c7aa0 corporate/4.0/SRPMS/phpMyAdmin-
Full Vigil@nce bulletin... (Free trial)

Computer vulnerabilities tracking service

Vigil@nce provides system vulnerability bulletins. The technology watch team tracks security threats targeting the computer system. Each administrator can customize the list of products for which he wants to receive vulnerability alerts. The Vigil@nce security watch publishes vulnerability bulletins about threats impacting the information system.