phpmyadmin: CVE-2007-5977 and CVE-2007-5976

Related Vulnerabilities: CVE-2007-5977   CVE-2007-5976   CVE-2006-6942  

Debian Bug report logs - #451465
phpmyadmin: CVE-2007-5977 and CVE-2007-5976

version graph

Reported by: Steffen Joeris <steffen.joeris@skolelinux.de>

Date: Fri, 16 Nov 2007 04:21:01 UTC

Severity: important

Tags: patch, security

Fixed in version 4:2.11.2.1-1

Done: "Thijs Kinkhorst" <thijs@debian.org>

Bug is archived. No further changes may be made.

Toggle useless messages

View this report as an mbox folder, status mbox, maintainer mbox


Report forwarded to debian-bugs-dist@lists.debian.org, Thijs Kinkhorst <thijs@debian.org>:
Bug#451465; Package phpmyadmin. (full text, mbox, link).


Acknowledgement sent to Steffen Joeris <steffen.joeris@skolelinux.de>:
New Bug report received and forwarded. Copy sent to Thijs Kinkhorst <thijs@debian.org>. (full text, mbox, link).


Message #5 received at submit@bugs.debian.org (full text, mbox, reply):

From: Steffen Joeris <steffen.joeris@skolelinux.de>
To: Debian Bug Tracking System <submit@bugs.debian.org>
Subject: phpmyadmin: CVE-2007-5977 and CVE-2007-5976
Date: Fri, 16 Nov 2007 15:30:40 +1100
Package: phpmyadmin
Severity: important
Tags: security, patch

Hi

The following two CVEs[0][1] have been assigned to phpmyadmin.

CVE-2007-5977:

Cross-site scripting (XSS) vulnerability in db_create.php in phpMyAdmin
before 2.11.2.1 allows remote authenticated users with CREATE DATABASE
privileges to inject arbitrary web script or HTML via a hex-encoded IMG
element in the db parameter in a POST request, a different vulnerability
than CVE-2006-6942. 


CVE-2007-5976:

SQL injection vulnerability in db_create.php in phpMyAdmin before
2.11.2.1 allows remote authenticated users with CREATE DATABASE
privileges to execute arbitrary SQL commands via the db parameter.


Please mention the CVEs in your changelog.

You can find the upstream patch below.

Cheers
Steffen

[0]: http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-5977

[1]: http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-5976

--- phpMyAdmin/libraries/List_Database.class.php        (.../RELEASE_2_11_2)    (revision 10919)
+++ phpmyadmin-2.11.2/libraries/List_Database.class.php (.../RELEASE_2_11_2_1)  (revision 10919)
@@ -378,10 +378,10 @@
             $selected = $this->getDefault();
         }

-    $return = '<ul id="databaseList" xml:lang="en" dir="ltr">' . "\n";
+    $return = '<ul id="databaseList" xml:lang="en" dir="ltr">' . "\n";
         foreach ($this->getGroupedDetails($offset, $count) as $group => $dbs) {
             if (count($dbs) > 1) {
-                $return .= '<li>' . $group . '<ul>' . "\n";
+                $return .= '<li>' . htmlspecialchars($group) . '<ul>' . "\n";
                 // wether display db_name cuted by the group part
                 $cut = true;
             } else {
@@ -389,15 +389,24 @@
                 $cut = false;
             }
             foreach ($dbs as $db) {
-            $return .= '<li';
-            if ($db['name'] == $selected) {
-                $return .= ' class="selected"';
+                $return .= '<li';
+                if ($db['name'] == $selected) {
+                    $return .= ' class="selected"';
+                }
+                $return .= '><a';
+                if (! empty($db['comment'])) {
+                    $return .= ' title="' . htmlspecialchars($db['comment']) . '"';
+                }
+                $return .= ' href="index.php?' . PMA_generate_common_url($db['name'])
+                    . '" target="_parent">';
+                if ($cut) {
+                    $return .= htmlspecialchars($db['disp_name_cut']);
+                } else {
+                    $return .= htmlspecialchars($db['disp_name']);
+                }
+                $return .= ' (' . $db['num_tables'] . ')';
+                $return .= '</a></li>' . "\n";
             }
-        $return .= '><a' . (! empty($db['comment']) ? ' title="' . $db['comment'] . '"' : '') . ' href="index.php?' . PMA_generate_common_url($db['name']) . '" target="_parent">';
-                $return .= ($cut ? $db['disp_name_cut'] : $db['disp_name'])
-            .' (' . $db['num_tables'] . ')';
-        $return .= '</a></li>' . "\n";
-            }
             if (count($dbs) > 1) {
                 $return .= '</ul></li>' . "\n";
             }
--- ../old/phpmyadmin-2.11.2/server_privileges.php      2007-10-27 13:06:02.000000000 +0000
+++ phpmyadmin-2.11.2/server_privileges.php     2007-11-16 04:12:15.000000000 +0000
@@ -2032,7 +2032,7 @@
             .   PMA_convert_using('`Db`') . ' AS `Db`, '
             .   $list_of_privileges
             .' FROM `mysql`.`db`'
-            .' WHERE ' . PMA_convert_using($checkprivs, 'quoted')
+           .' WHERE ' . PMA_convert_using(PMA_sqlAddslashes($checkprivs), 'quoted')
             .' LIKE ' . PMA_convert_using('`Db`')
             .' AND NOT (' . $list_of_compared_privileges. ')) '
             .'UNION '




Information forwarded to debian-bugs-dist@lists.debian.org, Thijs Kinkhorst <thijs@debian.org>:
Bug#451465; Package phpmyadmin. (full text, mbox, link).


Acknowledgement sent to Nico Golde <nion@debian.org>:
Extra info received and forwarded to list. Copy sent to Thijs Kinkhorst <thijs@debian.org>. (full text, mbox, link).


Message #10 received at 451465@bugs.debian.org (full text, mbox, reply):

From: Nico Golde <nion@debian.org>
To: control@bugs.debian.org
Cc: 451465@bugs.debian.org
Subject: severity of 451465 is grave
Date: Sat, 17 Nov 2007 15:47:38 +0100
# Automatically generated email from bts, devscripts version 2.10.11
# this can be really eval in shared environments
severity 451465 grave





Severity set to `grave' from `important' Request was from Nico Golde <nion@debian.org> to control@bugs.debian.org. (Sat, 17 Nov 2007 14:48:04 GMT) (full text, mbox, link).


Information forwarded to debian-bugs-dist@lists.debian.org, Thijs Kinkhorst <thijs@debian.org>:
Bug#451465; Package phpmyadmin. (full text, mbox, link).


Acknowledgement sent to "Thijs Kinkhorst" <thijs@debian.org>:
Extra info received and forwarded to list. Copy sent to Thijs Kinkhorst <thijs@debian.org>. (full text, mbox, link).


Message #17 received at 451465@bugs.debian.org (full text, mbox, reply):

From: "Thijs Kinkhorst" <thijs@debian.org>
To: "Nico Golde" <nion@debian.org>, 451465@bugs.debian.org
Cc: control@bugs.debian.org
Subject: Re: Bug#451465: severity of 451465 is grave
Date: Sat, 17 Nov 2007 21:16:16 +0100 (CET)
severity 451465 important
thanks

On Sat, November 17, 2007 15:47, Nico Golde wrote:
> # Automatically generated email from bts, devscripts version 2.10.11
> # this can be really eval in shared environments
> severity 451465 grave

If you let users create databases, you've got a lot more concerns than
cross site scripting locally in phpMyAdmin if you can't trust them. This
is 'important' at the very, very most.


Thijs





Severity set to `important' from `grave' Request was from "Thijs Kinkhorst" <thijs@debian.org> to control@bugs.debian.org. (Sat, 17 Nov 2007 20:18:09 GMT) (full text, mbox, link).


Reply sent to "Thijs Kinkhorst" <thijs@debian.org>:
You have taken responsibility. (full text, mbox, link).


Notification sent to Steffen Joeris <steffen.joeris@skolelinux.de>:
Bug acknowledged by developer. (full text, mbox, link).


Message #24 received at 451465-done@bugs.debian.org (full text, mbox, reply):

From: "Thijs Kinkhorst" <thijs@debian.org>
To: "Steffen Joeris" <steffen.joeris@skolelinux.de>, 451465-done@bugs.debian.org
Subject: Re: Bug#451465: phpmyadmin: CVE-2007-5977 and CVE-2007-5976
Date: Sat, 17 Nov 2007 21:17:41 +0100 (CET)
Version: 4:2.11.2.1-1

Hi,

Thanks, this has been fixed in the version above, uploaded last week.


Thijs





Information forwarded to debian-bugs-dist@lists.debian.org, Thijs Kinkhorst <thijs@debian.org>:
Bug#451465; Package phpmyadmin. (full text, mbox, link).


Acknowledgement sent to Nico Golde <nion@debian.org>:
Extra info received and forwarded to list. Copy sent to Thijs Kinkhorst <thijs@debian.org>. (full text, mbox, link).


Message #29 received at 451465@bugs.debian.org (full text, mbox, reply):

From: Nico Golde <nion@debian.org>
To: Thijs Kinkhorst <thijs@debian.org>
Cc: 451465@bugs.debian.org
Subject: Re: Bug#451465: severity of 451465 is grave
Date: Sun, 18 Nov 2007 03:52:15 +0100
[Message part 1 (text/plain, inline)]
Hi Thijs,
* Thijs Kinkhorst <thijs@debian.org> [2007-11-18 03:36]:
> severity 451465 important
> thanks
> 
> On Sat, November 17, 2007 15:47, Nico Golde wrote:
> > # Automatically generated email from bts, devscripts version 2.10.11
> > # this can be really eval in shared environments
> > severity 451465 grave
> 
> If you let users create databases, you've got a lot more concerns than
> cross site scripting locally in phpMyAdmin if you can't trust them. This
> is 'important' at the very, very most.

I raised it because of the sql injection not because of the 
cross-site scripting issue.
Kind regards
Nico
-- 
Nico Golde - http://www.ngolde.de - nion@jabber.ccc.de - GPG: 0x73647CFF
For security reasons, all text in this mail is double-rot13 encrypted.
[Message part 2 (application/pgp-signature, inline)]

Bug archived. Request was from Debbugs Internal Request <owner@bugs.debian.org> to internal_control@bugs.debian.org. (Tue, 18 Dec 2007 07:27:58 GMT) (full text, mbox, link).


Send a report that this bug log contains spam.


Debian bug tracking system administrator <owner@bugs.debian.org>. Last modified: Wed Jun 19 13:06:53 2019; Machine Name: buxtehude

Debian Bug tracking system

Debbugs is free software and licensed under the terms of the GNU Public License version 2. The current version can be obtained from https://bugs.debian.org/debbugs-source/.

Copyright © 1999 Darren O. Benham, 1997,2003 nCipher Corporation Ltd, 1994-97 Ian Jackson, 2005-2017 Don Armstrong, and many other contributors.