GLSA Advocate
![Advocate Advocate](/images/ranks/rank-G-1-advocate.gif)
Joined: 12 May 2004 Posts: 2663
|
Posted: Sat Apr 30, 2005 6:44 pm Post subject: [ GLSA 200504-30 ] phpMyAdmin: Insecure SQL script installat |
|
|
Gentoo Linux Security Advisory
Title: phpMyAdmin: Insecure SQL script installation (GLSA 200504-30)
Severity: normal
Exploitable: local
Date: April 30, 2005
Updated: May 22, 2006
Bug(s): #88831
ID: 200504-30
Synopsis
phpMyAdmin leaves the SQL install script with insecure permissions,
potentially leading to a database compromise.
Background
phpMyAdmin is a tool written in PHP intended to handle the
administration of MySQL databases from a web-browser. phpMyAdmin uses a
pma MySQL user to control the linked-tables infrastructure. The SQL
install script sets the initial password for the pma user.
Affected Packages
Package: dev-db/phpmyadmin
Vulnerable: < 2.6.2-r1
Unaffected: >= 2.6.2-r1
Architectures: All supported architectures
Description
The phpMyAdmin installation process leaves the SQL install script with
insecure permissions.
Impact
A local attacker could exploit this vulnerability to obtain the initial
phpMyAdmin password and from there obtain information about databases
accessible by phpMyAdmin.
Workaround
Change the password for the phpMyAdmin MySQL user (pma):
Code: |
mysql -u root -p
SET PASSWORD FOR 'pma'@'localhost' = PASSWORD('MyNewPassword'); |
Update your phpMyAdmin config.inc.php:
Code: | $cfg['Servers'][$i]['controlpass'] = 'MyNewPassword'; |
Resolution
All phpMyAdmin users should change password for the pma user as
described above and upgrade to the latest version:
Code: | # emerge --sync
# emerge --ask --oneshot --verbose ">=dev-db/phpmyadmin-2.6.2-r1" |
References
CVE-2005-1392
Last edited by GLSA on Fri Sep 20, 2013 4:20 am; edited 4 times in total |
|