phpmyadmin: CVE-2006-2417 and CVE-2006-2418: XSS

Debian Bug report logs - #368082
phpmyadmin: CVE-2006-2417 and CVE-2006-2418: XSS

version graph

Reported by: Alec Berryman <alec@thened.net>

Date: Fri, 19 May 2006 18:48:05 UTC

Severity: important

Tags: security

Fixed in version phpmyadmin/4:2.8.1-1

Done: Piotr Roszatycki <dexter@debian.org>

Bug is archived. No further changes may be made.

Toggle useless messages

View this report as an mbox folder, status mbox, maintainer mbox


Report forwarded to debian-bugs-dist@lists.debian.org, Debian Security Team <team@security.debian.org>, Piotr Roszatycki <dexter@debian.org>:
Bug#368082; Package phpmyadmin. (full text, mbox, link).


Acknowledgement sent to Alec Berryman <alec@thened.net>:
New Bug report received and forwarded. Copy sent to Debian Security Team <team@security.debian.org>, Piotr Roszatycki <dexter@debian.org>. (full text, mbox, link).


Message #5 received at submit@bugs.debian.org (full text, mbox, reply):

From: Alec Berryman <alec@thened.net>
To: Debian Bug Tracking System <submit@bugs.debian.org>
Subject: phpmyadmin: CVE-2006-2417 and CVE-2006-2418: XSS
Date: Fri, 19 May 2006 19:34:26 +0100
Package: phpmyadmin
Severity: important
Tags: security

-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

PMASA-2006-2 [1] details two cross-site-scripting vulnerabilities in
several versions of phpMyAdmin.  The advisory reports that all 2.8.0.x
releases are affected but older ones may be as well - for example, 2.6.2
(in sarge).

Please mention the CVEs in your changelog.

[1] http://www.phpmyadmin.net/home_page/security.php?issue=PMASA-2006-2

-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.3 (GNU/Linux)

iD8DBQFEbg+yAud/2YgchcQRAg2UAJ9euWxxb+0+pseImqWcwG2LNr0c5gCfYywi
mc6kJZJVszxw/HRbQ1uOd0E=
=PKla
-----END PGP SIGNATURE-----



Tags added: pending Request was from Piotr Roszatycki <dexter@n1.pl> to control@bugs.debian.org. (full text, mbox, link).


Reply sent to Piotr Roszatycki <dexter@debian.org>:
You have taken responsibility. (full text, mbox, link).


Notification sent to Alec Berryman <alec@thened.net>:
Bug acknowledged by developer. (full text, mbox, link).


Message #12 received at 368082-close@bugs.debian.org (full text, mbox, reply):

From: Piotr Roszatycki <dexter@debian.org>
To: 368082-close@bugs.debian.org
Subject: Bug#368082: fixed in phpmyadmin 4:2.8.1-1
Date: Mon, 26 Jun 2006 04:47:06 -0700
Source: phpmyadmin
Source-Version: 4:2.8.1-1

We believe that the bug you reported is fixed in the latest version of
phpmyadmin, which is due to be installed in the Debian FTP archive:

phpmyadmin_2.8.1-1.diff.gz
  to pool/main/p/phpmyadmin/phpmyadmin_2.8.1-1.diff.gz
phpmyadmin_2.8.1-1.dsc
  to pool/main/p/phpmyadmin/phpmyadmin_2.8.1-1.dsc
phpmyadmin_2.8.1-1_all.deb
  to pool/main/p/phpmyadmin/phpmyadmin_2.8.1-1_all.deb
phpmyadmin_2.8.1.orig.tar.gz
  to pool/main/p/phpmyadmin/phpmyadmin_2.8.1.orig.tar.gz



A summary of the changes between this version and the previous one is
attached.

Thank you for reporting the bug, which will now be closed.  If you
have further comments please address them to 368082@bugs.debian.org,
and the maintainer will reopen the bug report if appropriate.

Debian distribution maintenance software
pp.
Piotr Roszatycki <dexter@debian.org> (supplier of updated phpmyadmin package)

(This message was generated automatically at their request; if you
believe that there is a problem with it please contact the archive
administrators by mailing ftpmaster@debian.org)


-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

Format: 1.7
Date: Sun, 25 Jun 2006 18:10:23 +0200
Source: phpmyadmin
Binary: phpmyadmin
Architecture: source all
Version: 4:2.8.1-1
Distribution: unstable
Urgency: medium
Maintainer: Piotr Roszatycki <dexter@debian.org>
Changed-By: Piotr Roszatycki <dexter@debian.org>
Description: 
 phpmyadmin - set of PHP-scripts to administrate MySQL over the WWW
Closes: 362154 363519 363597 364702 367146 368082 373204
Changes: 
 phpmyadmin (4:2.8.1-1) unstable; urgency=medium
 .
   * New upstream release. Closes: #373204.
     - The French translation is correct. Closes: #362154.
     - Generates correct dumps with UPDATE syntax. Closes: #364702.
   * Security fix: XSRF vulnerability.
     See: http://www.phpmyadmin.net/home_page/security.php?issue=PMASA-2006-3
     See: http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-1804
   * Security fix: XSS vulnerabilities. It was not a problem for Debian with
     the default settings.
     See: http://www.phpmyadmin.net/home_page/security.php?issue=PMASA-2006-2
     See: http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-2031
     Closes: #363519, #368082.
   * Updated Portuguese debconf templates translation, thanks Miguel Figueiredo.
     Closes: #363597.
   * Updated Russian debconf templates translation, thanks Yuriy Talakan.
     Closes: #367146.
   * Convert non-ISO-8859-1 debconf templates translation to UTF-8.
Files: 
 dfe2c86bc5a1be2aee401c84ec3a4282 634 web extra phpmyadmin_2.8.1-1.dsc
 18104bccba01ff6618ed22a710019edf 3455447 web extra phpmyadmin_2.8.1.orig.tar.gz
 da8c395e567ff78e77eac80d0b3c755d 38949 web extra phpmyadmin_2.8.1-1.diff.gz
 4d6c6753a3a1d3906de7598a168e1ab2 3627512 web extra phpmyadmin_2.8.1-1_all.deb

-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.3 (GNU/Linux)

iD8DBQFEn6fghMHHe8CxClsRAoSLAJ9enUFWHp2wyp2wPPRlhd8n1rSLNQCgpZQQ
6niAqcbAjZL+Ri9di7AJo7s=
=LYX/
-----END PGP SIGNATURE-----




Information forwarded to debian-bugs-dist@lists.debian.org, Piotr Roszatycki <dexter@debian.org>:
Bug#368082; Package phpmyadmin. (full text, mbox, link).


Acknowledgement sent to Thijs Kinkhorst <thijs@debian.org>:
Extra info received and forwarded to list. Copy sent to Piotr Roszatycki <dexter@debian.org>. (full text, mbox, link).


Message #17 received at 368082@bugs.debian.org (full text, mbox, reply):

From: Thijs Kinkhorst <thijs@debian.org>
To: 339437@bugs.debian.org, 340438@bugs.debian.org, 362567@bugs.debian.org, 368082@bugs.debian.org
Cc: control@bugs.debian.org, team@security.debian.org
Subject: phpMyAdmin security vulnerabilities for sarge
Date: Thu, 03 Aug 2006 13:22:37 +0200
[Message part 1 (text/plain, inline)]
close 360726 4:2.6.2-3sarge1
thanks

Hello All,

I've checked out all open CVE's with respect to sarge. All are already
fixed in sid. I've prepared a package that fixes the ones that are
relevant. See the breakdown here:

> CVE-2005-3621   CRLF injection vulnerability in phpMyAdmin before 2.6.4-pl4 allows ...

Vulnerable, fixed in update.

> CVE-2005-3665   Multiple cross-site scripting (XSS) vulnerabilities in phpMyAdmin ...

Vulnerable, fixed in update.

> CVE-2005-3787   Multiple cross-site scripting (XSS) vulnerabilities in phpMyAdmin ...

This was all already fixed in 4:2.6.2-3sarge1.

> CVE-2006-1258   Cross-site scripting (XSS) vulnerability in phpMyAdmin 2.8.0.1 allows ...

Code not present in sarge - can be marked as not vulnerable.

> CVE-2006-1678   Multiple cross-site scripting (XSS) vulnerabilities in phpMyAdmin ...

Vulnerable, fixed in update.

> CVE-2006-1803   Cross-site scripting (XSS) vulnerability in sql.php in phpMyAdmin ...

Can not reproduce and in suggested to be a false duplicate of
CVE-2006-1804. I'm considering this one to be not vulnerable in sarge.

> CVE-2006-1804   XSRF SQL injection vulnerability in sql.php in phpMyAdmin 2.7.0-pl1 allows ...

Our sarge version doesn't have the whole XSRF-countering-mechanism so
this requires major code overhauls to address. XSRF is very common in
webapps and not easily fixed; it's doubtful if it's at all fixable.

> CVE-2006-2031   Cross-site scripting (XSS) vulnerability in index.php in phpMyAdmin ...

Not vulnerable, code not present in sarge.

> CVE-2006-2417   Cross-site scripting (XSS) vulnerability in phpMyAdmin 2.8.0.x before ...

Not vulnerable, code not present in sarge.

> CVE-2006-2418   Cross-site scripting (XSS) vulnerabilities in certain versions of ...

Vulnerable, fixed in update.

> CVE-2006-3388   Cross-site scripting (XSS) vulnerability in phpMyAdmin before 2.8.2 ...

Not vulnerable, code not present in sarge.

I've prepared an updated package, it can be found here:
http://www.a-eskwadraat.nl/~kink/debian/

Please let me know if it's ok and I'll upload it to the security
archive.


Thijs
[signature.asc (application/pgp-signature, inline)]

Information forwarded to debian-bugs-dist@lists.debian.org, Piotr Roszatycki <dexter@debian.org>:
Bug#368082; Package phpmyadmin. (full text, mbox, link).


Acknowledgement sent to Moritz Muehlenhoff <jmm@inutil.org>:
Extra info received and forwarded to list. Copy sent to Piotr Roszatycki <dexter@debian.org>. (full text, mbox, link).


Message #22 received at 368082@bugs.debian.org (full text, mbox, reply):

From: Moritz Muehlenhoff <jmm@inutil.org>
To: Thijs Kinkhorst <thijs@debian.org>
Cc: 339437@bugs.debian.org, 340438@bugs.debian.org, 362567@bugs.debian.org, 368082@bugs.debian.org, team@security.debian.org
Subject: Re: phpMyAdmin security vulnerabilities for sarge
Date: Mon, 7 Aug 2006 20:48:12 +0200
On Thu, Aug 03, 2006 at 01:22:37PM +0200, Thijs Kinkhorst wrote:
> close 360726 4:2.6.2-3sarge1
> thanks
> 
> Hello All,
> 
> I've checked out all open CVE's with respect to sarge. All are already
> fixed in sid. I've prepared a package that fixes the ones that are
> relevant. See the breakdown here:

Thanks a lot for your work.

> I've prepared an updated package, it can be found here:
> http://www.a-eskwadraat.nl/~kink/debian/
> 
> Please let me know if it's ok and I'll upload it to the security
> archive.

Please
- drop all po i18n updates
- fix indendation of the phpmyadmin-2.6.2/libraries/header_http.inc.php changes
  for CVE-2005-3621
- raise the version number to sarge3, we have an unsuitable sarge2 in the
  security queue (you couldn't know that and I forgot to tell you in advance,
  sorry)

The security fixes look all good.

Cheers,
        Moritz






Bug archived. Request was from Debbugs Internal Request <owner@bugs.debian.org> to internal_control@bugs.debian.org. (Tue, 26 Jun 2007 19:45:50 GMT) (full text, mbox, link).


Send a report that this bug log contains spam.


Debian bug tracking system administrator <owner@bugs.debian.org>. Last modified: Wed Jun 19 18:56:43 2019; Machine Name: buxtehude

Debian Bug tracking system

Debbugs is free software and licensed under the terms of the GNU Public License version 2. The current version can be obtained from https://bugs.debian.org/debbugs-source/.

Copyright © 1999 Darren O. Benham, 1997,2003 nCipher Corporation Ltd, 1994-97 Ian Jackson, 2005-2017 Don Armstrong, and many other contributors.