Language:
http://ha.xxor.se/2011/07/phpmyadmin-3x-multiple-remote-code.html
http://www.phpmyadmin.net/home_page/security/PMASA-2011-5.php
http://www.phpmyadmin.net/home_page/security/PMASA-2011-6.php
http://www.phpmyadmin.net/home_page/security/PMASA-2011-7.php
http://www.phpmyadmin.net/home_page/security/PMASA-2011-8.php
Severity: High
ID: 57346
File Name: phpmyadmin_pmasa_2011_8.nasl
Version: 1.10
Type: remote
Family: CGI abuses
Published: 12/20/2011
Updated: 4/11/2022
Configuration: Enable paranoid mode, Enable thorough checks
Supported Sensors: Nessus
Risk Factor: High
Score: 7.4
Risk Factor: High
Base Score: 7.5
Temporal Score: 5.9
Vector: CVSS2#AV:N/AC:L/Au:N/C:P/I:P/A:P
CPE: cpe:/a:phpmyadmin:phpmyadmin
Required KB Items: www/PHP, Settings/ParanoidReport, www/phpMyAdmin
Excluded KB Items: Settings/disable_cgi_scanning
Exploit Ease: No exploit is required
Patch Publication Date: 7/2/2011
Vulnerability Publication Date: 7/2/2011
Elliot (Phpmyadmin 3.x RCE)
CVE: CVE-2011-2505, CVE-2011-2506, CVE-2011-2507, CVE-2011-2508
BID: 48563