blob: 808ef3dac601500082e7013099fd5827634e6cdc [file] [log] [blame]
<?xml version="1.0" encoding="utf-8"?>
<glsa id="200504-30">
<title>phpMyAdmin: Insecure SQL script installation</title>
phpMyAdmin leaves the SQL install script with insecure permissions,
potentially leading to a database compromise.
<product type="ebuild">phpmyadmin</product>
<announced>April 30, 2005</announced>
<revised>May 22, 2006: 02</revised>
<package name="dev-db/phpmyadmin" auto="yes" arch="*">
<unaffected range="ge">2.6.2-r1</unaffected>
<vulnerable range="lt">2.6.2-r1</vulnerable>
phpMyAdmin is a tool written in PHP intended to handle the
administration of MySQL databases from a web-browser. phpMyAdmin uses a
pma MySQL user to control the linked-tables infrastructure. The SQL
install script sets the initial password for the pma user.
The phpMyAdmin installation process leaves the SQL install script with
insecure permissions.
<impact type="normal">
A local attacker could exploit this vulnerability to obtain the initial
phpMyAdmin password and from there obtain information about databases
accessible by phpMyAdmin.
Change the password for the phpMyAdmin MySQL user (pma):
mysql -u root -p
SET PASSWORD FOR 'pma'@'localhost' = PASSWORD('MyNewPassword');</code>
Update your phpMyAdmin
$cfg['Servers'][$i]['controlpass'] = 'MyNewPassword';</code>
All phpMyAdmin users should change password for the pma user as
described above and upgrade to the latest version:
# emerge --sync
# emerge --ask --oneshot --verbose &quot;&gt;=dev-db/phpmyadmin-2.6.2-r1&quot;</code>
<uri link="">CVE-2005-1392</uri>
<metadata tag="submitter" timestamp="Fri, 29 Apr 2005 08:17:12 +0000">
<metadata tag="bugReady" timestamp="Fri, 29 Apr 2005 18:24:53 +0000">