GLSA-201707-03 : phpMyAdmin: Security bypass

medium Nessus Plugin ID 101334

Synopsis

The remote Gentoo host is missing one or more security-related patches.

Description

The remote host is affected by the vulnerability described in GLSA-201707-03 (phpMyAdmin: Security bypass)

A vulnerability was discovered where the restrictions caused by “$cfg[‘Servers’][$i][‘AllowNoPassword’] = false” are bypassed under certain PHP versions. This can lead compromised user accounts, who have no passwords set, even if the administrator has set “$cfg[‘Servers’][$i][‘AllowNoPassword’]” to false (which is the default).
This behavior depends on the PHP version used (it seems PHP 5 is affected, while PHP 7.0 is not).
Impact :

A remote attacker, who only needs to know the username, could bypass security restrictions and access phpMyAdmin.
Workaround :

Set a password for all users.

Solution

All phpMyAdmin 4.0.x users should upgrade to the latest version:
# emerge --sync # emerge --ask --oneshot --verbose '>=dev-db/phpmyadmin-4.0.10.20:4.0.10.20' All other phpMyAdmin users should upgrade to the latest version:
# emerge --sync # emerge --ask --oneshot --verbose '>=dev-db/phpmyadmin-4.7.0:4.7.0'

See Also

https://www.phpmyadmin.net/security/PMASA-2017-8/

https://security.gentoo.org/glsa/201707-03

Plugin Details

Severity: Medium

ID: 101334

File Name: gentoo_GLSA-201707-03.nasl

Version: 3.2

Type: local

Published: 7/10/2017

Updated: 1/11/2021

Supported Sensors: Nessus

Vulnerability Information

CPE: p-cpe:/a:gentoo:linux:phpmyadmin, cpe:/o:gentoo:linux

Required KB Items: Host/local_checks_enabled, Host/Gentoo/release, Host/Gentoo/qpkg-list

Patch Publication Date: 7/8/2017

Reference Information

GLSA: 201707-03