FreeBSD VuXML: Documenting security issues in FreeBSD and the FreeBSD Ports Collection

phpmyadmin -- remote code inclusion and XSS scripting

Affected packages
phpmyadmin < 4.8.2

Details

VuXML ID 17cb6ff3-7670-11e8-8854-6805ca0b3d42
Discovery 2018-06-21
Entry 2018-06-22

The phpMyAdmin development team reports:

Summary

XSS in Designer feature

Description

A Cross-Site Scripting vulnerability was found in the Designer feature, where an attacker can deliver a payload to a user through a specially-crafted database name.

Severity

We consider this attack to be of moderate severity.

Summary

File inclusion and remote code execution attack

Description

A flaw has been discovered where an attacker can include (view and potentially execute) files on the server.

The vulnerability comes from a portion of code where pages are redirected and loaded within phpMyAdmin, and an improper test for whitelisted pages.

An attacker must be authenticated, except in these situations:

Severity

We consider this to be severe.

Mitigation factor

Configuring PHP with a restrictive `open_basedir` can greatly restrict an attacker's ability to view files on the server. Vulnerable systems should not be run with the phpMyAdmin directives $cfg['AllowArbitraryServer'] = true or $cfg['ServerDefault'] = 0

References

CVE Name CVE-2018-12581
CVE Name CVE-2018-12613
URL https://www.phpmyadmin.net/security/PMASA-2018-3/
URL https://www.phpmyadmin.net/security/PMASA-2018-4/