Gentoo Linux Security Advisory GLSA 200410-14
Title: phpMyAdmin: Vulnerability in MIME-based transformation
Date: October 18, 2004
A vulnerability has been found in the MIME-based transformation
system of phpMyAdmin, which may allow remote execution of arbitrary
commands if PHP’s “safe mode” is disabled.
phpMyAdmin is a popular web-based MySQL administration tool
written in PHP. It allows users to browse and administer a MySQL
database from a web-browser. Transformations are a phpMyAdmin
feature allowing plug-ins to rewrite the contents of any column
seen in phpMyAdmin’s Browsing mode, including using insertion of
|1 dev-db/phpmyadmin||< 2.6.0_p2||>= 2.6.0_p2|
A defect was found in phpMyAdmin’s MIME-based transformation
system, when used with “external” transformations.
A remote attacker could exploit this vulnerability to execute
arbitrary commands on the server with the rights of the HTTP server
Enabling PHP safe mode (“safe_mode = On” in php.ini) may serve
as a temporary workaround.
All phpMyAdmin users should upgrade to the latest version:
# emerge sync # emerge -pv ">=dev-db/phpmyadmin-2.6.0_p2" # emerge ">=dev-db/phpmyadmin-2.6.0_p2"
[ 1 ] phpMyAdmin 2.6.0_pl2 Release Announcement
[ 2 ] Secunia Advisory SA12813
This GLSA and any updates to it are available for viewing at the
Gentoo Security Website:
Security is a primary focus of Gentoo Linux and ensuring the
confidentiality and security of our users machines is of utmost
importance to us. Any security concerns should be addressed to
[email protected] or
alternatively, you may file a bug at http://bugs.gentoo.org.
Copyright 2004 Gentoo Foundation, Inc; referenced text belongs
to its owner(s).
The contents of this document are licensed under the Creative
Commons – Attribution / Share Alike license.