The Vigil@nce team watches public vulnerabilities impacting your computers, and then offers security solutions, a database and tools to fix them.

vulnerability announce CVE-2016-6606 CVE-2016-6607 CVE-2016-6608

phpMyAdmin: multiple vulnerabilities

Synthesis of the vulnerability

An attacker can use several vulnerabilities of phpMyAdmin.
Impacted products: Debian, Fedora, openSUSE, openSUSE Leap, phpMyAdmin, TYPO3 Extensions ~ not comprehensive.
Severity: 3/4.
Creation date: 17/08/2016.
Identifiers: CVE-2016-6606, CVE-2016-6607, CVE-2016-6608, CVE-2016-6609, CVE-2016-6610, CVE-2016-6611, CVE-2016-6612, CVE-2016-6613, CVE-2016-6614, CVE-2016-6615, CVE-2016-6616, CVE-2016-6617, CVE-2016-6618, CVE-2016-6619, CVE-2016-6620, CVE-2016-6621, CVE-2016-6622, CVE-2016-6623, CVE-2016-6624, CVE-2016-6625, CVE-2016-6626, CVE-2016-6627, CVE-2016-6628, CVE-2016-6629, CVE-2016-6630, CVE-2016-6631, CVE-2016-6632, CVE-2016-6633, DLA-626-1, DLA-757-1, DLA-834-1, FEDORA-2016-06e4de8210, FEDORA-2016-2eef68e635, openSUSE-SU-2016:2168-1, openSUSE-SU-2016:2176-1, PMASA-2016-29, PMASA-2016-30, PMASA-2016-31, PMASA-2016-32, PMASA-2016-33, PMASA-2016-34, PMASA-2016-35, PMASA-2016-36, PMASA-2016-37, PMASA-2016-38, PMASA-2016-39, PMASA-2016-40, PMASA-2016-41, PMASA-2016-42, PMASA-2016-43, PMASA-2016-44, PMASA-2016-45, PMASA-2016-46, PMASA-2016-47, PMASA-2016-48, PMASA-2016-49, PMASA-2016-50, PMASA-2016-51, PMASA-2016-52, PMASA-2016-53, PMASA-2016-54, PMASA-2016-55, PMASA-2016-56, TYPO3-EXT-SA-2016-025, VIGILANCE-VUL-20412.

Description of the vulnerability

Several vulnerabilities were announced in phpMyAdmin.

An attacker can bypass security features via Cookie Encryption, in order to obtain sensitive information. [severity:2/4; CVE-2016-6606, PMASA-2016-29]

An attacker can trigger a Cross Site Scripting, in order to run JavaScript code in the context of the web site. [severity:2/4; CVE-2016-6607, PMASA-2016-30]

An attacker can trigger a Cross Site Scripting, in order to run JavaScript code in the context of the web site. [severity:2/4; CVE-2016-6608, PMASA-2016-31]

An attacker can use a vulnerability via Array Export, in order to run code. [severity:2/4; CVE-2016-6609, PMASA-2016-32]

An attacker can bypass security features via Full Path, in order to obtain sensitive information. [severity:1/4; CVE-2016-6610, PMASA-2016-33]

An attacker can use a SQL injection, in order to read or alter data. [severity:2/4; CVE-2016-6611, PMASA-2016-34]

An attacker can bypass file access restrictions via LOAD LOCAL INFILE, in order to obtain sensitive information. [severity:2/4; CVE-2016-6612, PMASA-2016-35]

An attacker can bypass file access restrictions via UploadDir, in order to obtain sensitive information. [severity:2/4; CVE-2016-6613, PMASA-2016-36]

An attacker can traverse directories via SaveDir/UploadDir, in order to read/create a file outside the root path. [severity:2/4; CVE-2016-6614, PMASA-2016-37]

An attacker can trigger a Cross Site Scripting, in order to run JavaScript code in the context of the web site. [severity:2/4; CVE-2016-6615, PMASA-2016-38]

An attacker can use a SQL injection, in order to read or alter data. [severity:2/4; CVE-2016-6616, PMASA-2016-39]

An attacker can use a SQL injection, in order to read or alter data. [severity:2/4; CVE-2016-6617, PMASA-2016-40]

An attacker can trigger a fatal error via Transformation, in order to trigger a denial of service. [severity:2/4; CVE-2016-6618, PMASA-2016-41]

An attacker can use a SQL injection via Control User, in order to read or alter data. [severity:2/4; CVE-2016-6619, PMASA-2016-42]

An attacker can use a vulnerability via Unserialize, in order to run code. [severity:2/4; CVE-2016-6620, PMASA-2016-43]

A SSRF vulnerability was announced via Setup Script. [severity:2/4; CVE-2016-6621, PMASA-2016-44]

An attacker can trigger a fatal error via Persistent Connections, in order to trigger a denial of service. [severity:2/4; CVE-2016-6622, PMASA-2016-45]

An attacker can generate an infinite loop, in order to trigger a denial of service. [severity:2/4; CVE-2016-6623, PMASA-2016-46]

An attacker can bypass security features via Proxy Server, in order to escalate his privileges. [severity:2/4; CVE-2016-6624, PMASA-2016-47]

An attacker can bypass security features, in order to obtain sensitive information. [severity:2/4; CVE-2016-6625, PMASA-2016-48]

An attacker can deceive the user, in order to redirect him to a malicious site. [severity:1/4; CVE-2016-6626, PMASA-2016-49]

An attacker can bypass security features via url.php, in order to obtain sensitive information. [severity:2/4; CVE-2016-6627, PMASA-2016-50]

An attacker can bypass file access restrictions via SVG, in order to obtain sensitive information. [severity:2/4; CVE-2016-6628, PMASA-2016-51]

An attacker can bypass security features via ArbitraryServerRegexp, in order to escalate his privileges. [severity:2/4; CVE-2016-6629, PMASA-2016-52]

An attacker can trigger a fatal error via Long Password, in order to trigger a denial of service. [severity:2/4; CVE-2016-6630, PMASA-2016-53]

An attacker can use a vulnerability via CGI, in order to run code. [severity:3/4; CVE-2016-6631, PMASA-2016-54]

An attacker can trigger a fatal error via Dbase Extension, in order to trigger a denial of service. [severity:3/4; CVE-2016-6632, PMASA-2016-55]

An attacker can use a vulnerability via Dbase Extension, in order to run code. [severity:3/4; CVE-2016-6633, PMASA-2016-56]
Complete Vigil@nce bulletin.... (Free trial)

Computer vulnerabilities tracking service

Vigil@nce provides a systems vulnerabilities alert. The Vigil@nce computer vulnerability tracking service alerts your teams of vulnerabilities or threats impacting your information system. The Vigil@nce team tracks computer vulnerabilities impacting systems and applications. The Vigil@nce security watch publishes vulnerability bulletins about threats impacting the information system.