The Vigil@nce team watches public vulnerabilities impacting your computers, and then offers security solutions, a vigilance database and tools to fix them.

Vulnerability of phpMyAdmin: backdoor in server_sync.php

Synthesis of the vulnerability 

One server from was distributing a phpMyAdmin archive with a backdoor.
Impacted products: phpMyAdmin.
Severity of this bulletin: 3/4.
Creation date: 26/09/2012.
Références of this threat: BID-55672, CERTA-2012-AVI-523, CVE-2012-5159, PMASA-2012-5, VIGILANCE-VUL-11979.

Description of the vulnerability 

The phpMyAdmin software is distributed via SourceForge.

The Korean "cdnetworks-kr-1" mirror contained an altered version of the archive A new file named "server_sync.php" was added in the archive (VIGILANCE-ACTU-3590). This script evaluates the posted "c" variable (with "eval($_POST['c'])").

An attacker can therefore directly access to the web page "server_sync.php", in order to execute code on the server.
Full bulletin, software filtering, emails, fixes, ... (Request your free trial)

This weakness bulletin impacts software or systems such as phpMyAdmin.

Our Vigil@nce team determined that the severity of this computer weakness is important.

The trust level is of type confirmed by the editor, with an origin of internet server.

A proof of concept or an attack tool is available, so your teams have to process this alert. An attacker with a technician ability can exploit this vulnerability announce.

Solutions for this threat 

phpMyAdmin: workaround for server_sync.php.
If the file was downloaded from SourceForge, and if it contains a file named "server_sync.php", the administrator has to download a new archive of phpMyAdmin, and to reinstall it.
Full bulletin, software filtering, emails, fixes, ... (Request your free trial)

Computer vulnerabilities tracking service 

Vigil@nce provides a software vulnerabilities bulletin. The Vigil@nce security watch publishes vulnerability bulletins about threats impacting the information system.