svn commit: r316477 - in head: databases/phpmyadmin security/vuxml

Matthew Seaman matthew at FreeBSD.org
Wed Apr 24 20:23:17 UTC 2013


Author: matthew
Date: Wed Apr 24 20:23:16 2013
New Revision: 316477
URL: http://svnweb.freebsd.org/changeset/ports/316477

Log:
  Security updae to 3.5.8.1
  
  Four new serious security alerts were issued today by the phpMyAdmin
  them: PMASA-2013-2 and PMASA-2013-3 are documented in this commit to
  vuln.xml.
  
   - Remote code execution via preg_replace().
  
   - Locally Saved SQL Dump File Multiple File Extension Remote Code
     Execution.
  
  The other two: PMASA-2013-4 and PMASA-2013-5 only affect PMA 4.0.0
  pre-releases earlier than 4.0.0-rc3, which are not available through
  the ports.

Modified:
  head/databases/phpmyadmin/Makefile
  head/databases/phpmyadmin/distinfo
  head/security/vuxml/vuln.xml

Modified: head/databases/phpmyadmin/Makefile
==============================================================================
--- head/databases/phpmyadmin/Makefile	Wed Apr 24 19:42:33 2013	(r316476)
+++ head/databases/phpmyadmin/Makefile	Wed Apr 24 20:23:16 2013	(r316477)
@@ -2,7 +2,7 @@
 # $FreeBSD$
 
 PORTNAME=	phpMyAdmin
-DISTVERSION=	3.5.8
+DISTVERSION=	3.5.8.1
 CATEGORIES=	databases www
 MASTER_SITES=	SF/${PORTNAME:L}/${PORTNAME}/${DISTVERSION}
 DISTNAME=	${PORTNAME}-${DISTVERSION}-all-languages

Modified: head/databases/phpmyadmin/distinfo
==============================================================================
--- head/databases/phpmyadmin/distinfo	Wed Apr 24 19:42:33 2013	(r316476)
+++ head/databases/phpmyadmin/distinfo	Wed Apr 24 20:23:16 2013	(r316477)
@@ -1,2 +1,2 @@
-SHA256 (phpMyAdmin-3.5.8-all-languages.tar.xz) = 0766acb45d862ca802b5d3018f240bdd0a14749e21f40ebabe51bf25d6088409
-SIZE (phpMyAdmin-3.5.8-all-languages.tar.xz) = 3744780
+SHA256 (phpMyAdmin-3.5.8.1-all-languages.tar.xz) = c66737ff55369b1c9e4b116e68f3c517faf7c4bc17e289d008d74fde6c8260f6
+SIZE (phpMyAdmin-3.5.8.1-all-languages.tar.xz) = 3744808

Modified: head/security/vuxml/vuln.xml
==============================================================================
--- head/security/vuxml/vuln.xml	Wed Apr 24 19:42:33 2013	(r316476)
+++ head/security/vuxml/vuln.xml	Wed Apr 24 20:23:16 2013	(r316477)
@@ -51,6 +51,59 @@ Note:  Please add new entries to the beg
 
 -->
 <vuxml xmlns="http://www.vuxml.org/apps/vuxml-1">
+  <vuln vid="8c8fa44d-ad15-11e2-8cea-6805ca0b3d42">
+    <topic>phpMyAdmin -- Multiple security vulnerabilities</topic>
+    <affects>
+      <package>
+	<name>phpMyAdmin</name>
+	<range><ge>3.5</ge><lt>3.5.8.1</lt></range>
+      </package>
+    </affects>
+    <description>
+      <body xmlns="http://www.w3.org/1999/xhtml">
+	<p>The phpMyAdmin development team reports:</p>
+	<blockquote cite="http://www.phpmyadmin.net/home_page/security/PMASA-2013-2.php">
+	  <p>In some PHP versions, the preg_replace() function can be
+	  tricked into executing arbitrary PHP code on the
+	  server. This is done by passing a crafted argument as the
+	  regular expression, containing a null byte. phpMyAdmin does
+	  not correctly sanitize an argument passed to preg_replace()
+	  when using the "Replace table prefix" feature, opening the
+	  way to this vulnerability..</p>
+	  <p>This vulnerability can be triggered only by someone who
+	  logged in to phpMyAdmin, as the usual token protection
+	  prevents non-logged-in users to access the required
+	  form.</p>
+	</blockquote>
+	<blockquote cite="http://www.phpmyadmin.net/home_page/security/PMASA-2013-3.php">
+	  <p>phpMyAdmin can be configured to save an export file on
+	  the web server, via its SaveDir directive. With this in
+	  place, it's possible, either via a crafted filename template
+	  or a crafted table name, to save a double extension file
+	  like foobar.php.sql. In turn, an Apache webserver on which
+	  there is no definition for the MIME type "sql" (the default)
+	  will treat this saved file as a ".php" script, leading to
+	  remote code execution.</p>
+	  <p>This vulnerability can be triggered only by someone who
+	  logged in to phpMyAdmin, as the usual token protection
+	  prevents non-logged-in users to access the required
+	  form. Moreover, the SaveDir directive is empty by default,
+	  so a default configuration is not vulnerable. The
+	  $cfg['SaveDir'] directive must be configured, and the server
+	  must be running Apache with mod_mime to be exploitable.</p>
+	</blockquote>
+      </body>
+    </description>
+    <references>
+      <cvename>CVE-2013-3238</cvename>
+      <cvename>CVE-2013-3239</cvename>
+    </references>
+    <dates>
+      <discovery>2013-04-24</discovery>
+      <entry>2013-04-24</entry>
+    </dates>
+  </vuln>
+
   <vuln vid="aeb962f6-ab8d-11e2-b3f5-003067c2616f">
     <topic>tinc -- Buffer overflow</topic>
     <affects>


More information about the svn-ports-all mailing list