blob: e7c9dbb27efef0c399f5fc4e0bbdfbcfb17e8bb9 [file] [log] [blame]
<?xml version="1.0" encoding="utf-8"?>
<glsa id="200410-14">
<title>phpMyAdmin: Vulnerability in MIME-based transformation system</title>
A vulnerability has been found in the MIME-based transformation system of
phpMyAdmin, which may allow remote execution of arbitrary commands if PHP's
"safe mode" is disabled.
<product type="ebuild">phpMyAdmin</product>
<announced>October 18, 2004</announced>
<revised>May 22, 2006: 02</revised>
<package name="dev-db/phpmyadmin" auto="yes" arch="*">
<unaffected range="ge">2.6.0_p2</unaffected>
<vulnerable range="lt">2.6.0_p2</vulnerable>
phpMyAdmin is a popular web-based MySQL administration tool written in
PHP. It allows users to browse and administer a MySQL database from a
web-browser. Transformations are a phpMyAdmin feature allowing plug-ins
to rewrite the contents of any column seen in phpMyAdmin's Browsing
mode, including using insertion of PHP or JavaScript code.
A defect was found in phpMyAdmin's MIME-based transformation system,
when used with "external" transformations.
<impact type="high">
A remote attacker could exploit this vulnerability to execute arbitrary
commands on the server with the rights of the HTTP server user.
Enabling PHP safe mode ("safe_mode = On" in php.ini) may serve as a
temporary workaround.
All phpMyAdmin users should upgrade to the latest version:
# emerge sync
# emerge -pv &quot;&gt;=dev-db/phpmyadmin-2.6.0_p2&quot;
# emerge &quot;&gt;=dev-db/phpmyadmin-2.6.0_p2&quot;</code>
<uri link="">phpMyAdmin 2.6.0_pl2 Release Announcement</uri>
<uri link="">Secunia Advisory SA12813</uri>
<uri link="">CVE-2004-2630</uri>
<metadata tag="requester" timestamp="Thu, 14 Oct 2004 19:19:23 +0000">
<metadata tag="submitter" timestamp="Sat, 16 Oct 2004 10:34:28 +0000">
<metadata tag="bugReady" timestamp="Sun, 17 Oct 2004 17:40:28 +0000">