Access Restriction Bypass Affecting phpmyadmin package, versions <4:3.0.0
Threat Intelligence
EPSS
10.06% (95th
percentile)
Do your applications use this vulnerable package?
In a few clicks we can analyze your entire application and see what components are vulnerable in your application, and suggest you quick fixes.
Test your applications- Snyk ID SNYK-DEBIAN8-PHPMYADMIN-418119
- published 24 Aug 2010
- disclosed 24 Aug 2010
Introduced: 24 Aug 2010
CVE-2010-3055 Open this link in a new tabHow to fix?
Upgrade Debian:8 phpmyadmin to version 4:3.0.0 or higher.
NVD Description
Note: Versions mentioned in the description apply only to the upstream phpmyadmin package and not the phpmyadmin package as distributed by Debian.
See How to fix? for Debian:8 relevant fixed versions and status.
The configuration setup script (aka scripts/setup.php) in phpMyAdmin 2.11.x before 2.11.10.1 does not properly restrict key names in its output file, which allows remote attackers to execute arbitrary PHP code via a crafted POST request.
References
- https://security-tracker.debian.org/tracker/CVE-2010-3055
- http://www.debian.org/security/2010/dsa-2097
- http://phpmyadmin.git.sourceforge.net/git/gitweb.cgi?p=phpmyadmin/phpmyadmin;a=commitdiff;h=30c83acddb58d3bbf940b5f9ec28abf5b235f4d2
- http://sourceforge.net/tracker/?func=detail&aid=3045132&group_id=23067&atid=377408
- http://www.phpmyadmin.net/home_page/security/PMASA-2010-4.php
- http://www.vupen.com/english/advisories/2010/2223
- http://www.vupen.com/english/advisories/2010/2231
- http://secunia.com/advisories/41058
- http://secunia.com/advisories/41185
- http://www.securityfocus.com/bid/42591
- http://www.mandriva.com/security/advisories?name=MDVSA-2010:163
- http://phpmyadmin.git.sourceforge.net/git/gitweb.cgi?p=phpmyadmin/phpmyadmin%3Ba=commitdiff%3Bh=30c83acddb58d3bbf940b5f9ec28abf5b235f4d2
CVSS Scores
version 3.1