exploit the possibilities
Home Files News &[SERVICES_TAB]About Contact Add New

Secunia Security Advisory 17578

Secunia Security Advisory 17578
Posted Nov 19, 2005
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Toni Koivunen has reported a vulnerability in phpMyAdmin, which can be exploited by malicious people to conduct HTTP response splitting attacks. Some input passed to libraries/header_http.inc.php isn't properly sanitised before being returned to the user. This can be exploited to include arbitrary HTTP headers in a response sent to the user. Successful exploitation requires that register_globals is enabled. It is also possible to disclose the full path to certain scripts by accessing them directly. The vulnerability has been reported in versions prior to 2.6.4-pl4 and in version 2.7.0-beta1.

tags | advisory, web, arbitrary, php
SHA-256 | e44792a331c5f72e03e5713b61e2db82c634886e0b6795144bc9dace25ee26c5

Secunia Security Advisory 17578

Change Mirror Download


TITLE:
phpMyAdmin HTTP Response Splitting Vulnerability

SECUNIA ADVISORY ID:
SA17578

VERIFY ADVISORY:
http://secunia.com/advisories/17578/

CRITICAL:
Less critical

IMPACT:
Exposure of system information, Cross Site Scripting

WHERE:
>From remote

SOFTWARE:
phpMyAdmin 2.x
http://secunia.com/product/1720/
phpMyAdmin 1.x
http://secunia.com/product/1719/

DESCRIPTION:
Toni Koivunen has reported a vulnerability in phpMyAdmin, which can
be exploited by malicious people to conduct HTTP response splitting
attacks.

Some input passed to "libraries/header_http.inc.php" isn't properly
sanitised before being returned to the user. This can be exploited to
include arbitrary HTTP headers in a response sent to the user.

Successful exploitation requires that "register_globals" is enabled.

It is also possible to disclose the full path to certain scripts by
accessing them directly.

The vulnerability has been reported in versions prior to 2.6.4-pl4
and in version 2.7.0-beta1.

SOLUTION:
Update to version 2.6.4-pl4.
http://www.phpmyadmin.net/home_page/downloads.php

PROVIDED AND/OR DISCOVERED BY:
Toni Koivunen

ORIGINAL ADVISORY:
Toni Koivunen:
http://www.fitsec.com/advisories/FS-05-02.txt

phpMyAdmin:
http://www.phpmyadmin.net/home_page/security.php?issue=PMASA-2005-6

----------------------------------------------------------------------

About:
This Advisory was delivered by Secunia as a free service to help
everybody keeping their systems up to date against the latest
vulnerabilities.

Subscribe:
http://secunia.com/secunia_security_advisories/

Definitions: (Criticality, Where etc.)
http://secunia.com/about_secunia_advisories/


Please Note:
Secunia recommends that you verify all advisories you receive by
clicking the link.
Secunia NEVER sends attached files with advisories.
Secunia does not advise people to install third party patches, only
use those supplied by the vendor.

----------------------------------------------------------------------

Login or Register to add favorites

File Archive:

May 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    May 1st
    44 Files
  • 2
    May 2nd
    5 Files
  • 3
    May 3rd
    11 Files
  • 4
    May 4th
    0 Files
  • 5
    May 5th
    0 Files
  • 6
    May 6th
    0 Files
  • 7
    May 7th
    0 Files
  • 8
    May 8th
    0 Files
  • 9
    May 9th
    0 Files
  • 10
    May 10th
    0 Files
  • 11
    May 11th
    0 Files
  • 12
    May 12th
    0 Files
  • 13
    May 13th
    0 Files
  • 14
    May 14th
    0 Files
  • 15
    May 15th
    0 Files
  • 16
    May 16th
    0 Files
  • 17
    May 17th
    0 Files
  • 18
    May 18th
    0 Files
  • 19
    May 19th
    0 Files
  • 20
    May 20th
    0 Files
  • 21
    May 21st
    0 Files
  • 22
    May 22nd
    0 Files
  • 23
    May 23rd
    0 Files
  • 24
    May 24th
    0 Files
  • 25
    May 25th
    0 Files
  • 26
    May 26th
    0 Files
  • 27
    May 27th
    0 Files
  • 28
    May 28th
    0 Files
  • 29
    May 29th
    0 Files
  • 30
    May 30th
    0 Files
  • 31
    May 31st
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2022 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close