27.02.2013 Views

(PVS) Signatures - Tenable Network Security

(PVS) Signatures - Tenable Network Security

(PVS) Signatures - Tenable Network Security

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

Solution: Upgrade or patch according to vendor recommendations.<br />

CVE-2001-0478<br />

phpMyAdmin < 2.5.6-rc1 Traversal Arbitrary File Access (2)<br />

<strong>PVS</strong> ID: 2419 FAMILY: CGI<br />

RISK:<br />

MEDIUM<br />

NESSUS ID:12041<br />

Description: Synopsis :\n\nThe remote host is vulnerable to a flaw that allows attackers to retrieve<br />

sensitive files or data.\n\nThe remote host is running phpMyAdmin, an open-source<br />

software written in PHP to handle the administration of MySQL over the Web.\nIt is<br />

possible to make the remote phpMyAdmin installation read arbitrary data on the remote<br />

host by using a malformed URL.\nAn attacker may use this flaw to read /etc/passwd or any<br />

file that a web server has the right to access.<br />

Solution: Upgrade to phpMyAdmin 2.5.6-rc1 or higher.<br />

CVE-2004-0129<br />

phpMyAdmin < 2.5.2 Multiple Vulnerabilities<br />

<strong>PVS</strong> ID: 2420 FAMILY: CGI<br />

RISK:<br />

MEDIUM<br />

NESSUS ID:11761<br />

Description: Synopsis :\n\nThe remote host may give an attacker information useful for future<br />

attacks.\n\nThe remote host is running phpMyAdmin, an open-source software written in<br />

PHP to handle the administration of MySQL over the Web.\nThe remote version of this<br />

software is vulnerable to several flaws :\n- It may be tricked into disclosing the physical<br />

path of the remote PHP installation\n- It is vulnerable to cross-site scripting, which may<br />

allow an attacker to steal the cookies of your users\n - It is vulnerable to a flaw that may<br />

allow an attacker to list the content of arbitrary directories on the remote server.\nAn<br />

attacker may use these flaws to gain more knowledge about the remote host and therefore<br />

set up more complex attacks against it.<br />

Solution: Upgrade to phpMyAdmin 2.5.2 or higher.<br />

CVE Not available<br />

Passive Vulnerability Scanner (<strong>PVS</strong>) <strong>Signatures</strong><br />

phpMyAdmin < 2.6.0-p12 Multiple Remote Command Execution<br />

<strong>PVS</strong> ID: 2421 FAMILY: CGI RISK: HIGH NESSUS ID:11761<br />

Description: Synopsis :\n\nThe remote host is vulnerable to an arbitrary 'command insertion'<br />

flaw.\n\nThe remote host is running phpMyAdmin, an open-source software written in PHP<br />

to handle the administration of MySQL over the Web.\nThe remote version of this software<br />

is vulnerable to arbitrary command execution due to a lack of user-supplied data<br />

sanitization.\n<br />

Solution: Upgrade to phpMyAdmin 2.6.0-pl2 or higher.<br />

Family Internet Services 613

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!