CVE-2005-3300 Affecting phpmyadmin package, versions <4:2.6.4-pl3-1
Threat Intelligence
Do your applications use this vulnerable package?
In a few clicks we can analyze your entire application and see what components are vulnerable in your application, and suggest you quick fixes.
Test your applications- Snyk ID SNYK-DEBIAN8-PHPMYADMIN-417894
- published 23 Oct 2005
- disclosed 23 Oct 2005
Introduced: 23 Oct 2005
CVE-2005-3300 Open this link in a new tabHow to fix?
Upgrade Debian:8 phpmyadmin to version 4:2.6.4-pl3-1 or higher.
NVD Description
Note: Versions mentioned in the description apply only to the upstream phpmyadmin package and not the phpmyadmin package as distributed by Debian.
See How to fix? for Debian:8 relevant fixed versions and status.
The register_globals emulation layer in grab_globals.php for phpMyAdmin before 2.6.4-pl3 does not perform safety checks on values in the _FILES array for uploaded files, which allows remote attackers to include arbitrary files by using direct requests to library scripts that do not use grab_globals.php, then modifying certain configuration values for the theme.
References
- https://security-tracker.debian.org/tracker/CVE-2005-3300
- http://www.debian.org/security/2005/dsa-880
- http://www.gentoo.org/security/en/glsa/glsa-200510-21.xml
- http://marc.info/?l=bugtraq&m=113017591414699&w=2
- http://archives.neohapsis.com/archives/fulldisclosure/2005-10/0478.
- http://securitytracker.com/id?1015091
- http://www.hardened-php.net/advisory_162005.73.html
- http://www.novell.com/linux/security/advisories/2005_28_sr.html
- http://www.novell.com/linux/security/advisories/2005_66_phpmyadmin.html
- http://www.phpmyadmin.net/home_page/security.php?issue=PMASA-2005-5
- http://secunia.com/advisories/17289/
- http://secunia.com/advisories/17337
- http://secunia.com/advisories/17559
- http://secunia.com/advisories/17607
- http://www.securityfocus.com/bid/15169
- https://exchange.xforce.ibmcloud.com/vulnerabilities/22835