The Vigil@nce team watches public vulnerabilities impacting your computers, and then offers security solutions, a database and tools to fix them.

computer vulnerability alert CVE-2016-4412 CVE-2016-9847 CVE-2016-9848

phpMyAdmin: multiple vulnerabilities

Synthesis of the vulnerability

An attacker can use several vulnerabilities of phpMyAdmin.
Impacted products: Debian, Fedora, openSUSE, openSUSE Leap, phpMyAdmin, Synology DSM, Synology DS***, Synology RS***.
Severity: 2/4.
Creation date: 25/11/2016.
Identifiers: CERTFR-2016-AVI-390, CVE-2016-4412, CVE-2016-9847, CVE-2016-9848, CVE-2016-9849, CVE-2016-9850, CVE-2016-9851, CVE-2016-9852, CVE-2016-9853, CVE-2016-9854, CVE-2016-9855, CVE-2016-9856, CVE-2016-9857, CVE-2016-9858, CVE-2016-9859, CVE-2016-9860, CVE-2016-9861, CVE-2016-9862, CVE-2016-9863, CVE-2016-9864, CVE-2016-9865, CVE-2016-9866, DLA-757-1, DLA-834-1, FEDORA-2016-2424eeca35, FEDORA-2016-6576a8536b, FEDORA-2016-7fc142da66, openSUSE-SU-2016:3007-1, PMASA-2016-57, PMASA-2016-58, PMASA-2016-59, PMASA-2016-60, PMASA-2016-61, PMASA-2016-62, PMASA-2016-63, PMASA-2016-64, PMASA-2016-65, PMASA-2016-66, PMASA-2016-67, PMASA-2016-68, PMASA-2016-69, PMASA-2016-70, PMASA-2016-71, VIGILANCE-VUL-21206.

Description of the vulnerability

Several vulnerabilities were announced in phpMyAdmin.

An attacker can deceive the user, in order to redirect him to a malicious site. [severity:1/4; CVE-2016-4412, PMASA-2016-57]

An attacker can bypass security features via blowfish_secret, in order to obtain sensitive information. [severity:2/4; CVE-2016-9847, PMASA-2016-58]

An attacker can bypass security features via HttpOnly Cookies, in order to obtain sensitive information. [severity:1/4; CVE-2016-9848, PMASA-2016-59]

An attacker can bypass security features via Null Byte, in order to escalate his privileges. [severity:2/4; CVE-2016-9849, PMASA-2016-60]

An attacker can bypass security features via Allow/deny Rules, in order to escalate his privileges. [severity:2/4; CVE-2016-9850, PMASA-2016-61]

An attacker can bypass security features via Logout Timeout, in order to escalate his privileges. [severity:1/4; CVE-2016-9851, PMASA-2016-62]

An attacker can bypass security features via Full Path Disclosure, in order to obtain sensitive information. [severity:1/4; CVE-2016-9852, CVE-2016-9853, CVE-2016-9854, CVE-2016-9855, PMASA-2016-63]

An attacker can trigger a Cross Site Scripting, in order to run JavaScript code in the context of the web site. [severity:2/4; CVE-2016-9856, CVE-2016-9857, PMASA-2016-64]

An attacker can trigger a fatal error, in order to trigger a denial of service. [severity:2/4; CVE-2016-9858, CVE-2016-9859, CVE-2016-9860, PMASA-2016-65]

An attacker can deceive the user, in order to redirect him to a malicious site. [severity:1/4; CVE-2016-9861, PMASA-2016-66]

An attacker can use a vulnerability via BBCode, in order to run code. [severity:2/4; CVE-2016-9862, PMASA-2016-67]

An attacker can trigger a fatal error via Table Partitioning, in order to trigger a denial of service. [severity:2/4; CVE-2016-9863, PMASA-2016-68]

An attacker can use a SQL injection, in order to read or alter data. [severity:2/4; CVE-2016-9864, PMASA-2016-69]

An attacker can use a vulnerability via PMA_safeUnserialize, in order to run code. [severity:2/4; CVE-2016-9865, PMASA-2016-70]

An attacker can trigger a Cross Site Request Forgery, in order to force the victim to perform operations. [severity:2/4; CVE-2016-9866, PMASA-2016-71]
Complete Vigil@nce bulletin.... (Free trial)

Computer vulnerabilities tracking service

Vigil@nce provides networks vulnerabilities patches. The Vigil@nce security watch publishes vulnerability bulletins about threats impacting the information system. The Vigil@nce vulnerability database contains several thousand vulnerabilities. The Vigil@nce team tracks computer vulnerabilities impacting systems and applications.