ID

VAR-200511-0093


CVE

CVE-2005-3621


TITLE

phpMyAdmin CRLF Injection vulnerability

Trust: 0.6

sources: CNNVD: CNNVD-200511-204

DESCRIPTION

CRLF injection vulnerability in phpMyAdmin before 2.6.4-pl4 allows remote attackers to conduct HTTP response splitting attacks via unspecified scripts. phpMyAdmin is prone to an HTTP-response-splitting vulnerability because the application fails to properly sanitize user-supplied input. A remote attacker may exploit this vulnerability to influence or misrepresent web content is served, cached, or interpreted. This could aid in various attacks that attempt to entice client users into a false sense of trust. This issue is reported to affect phpMyAdmin version 2.7.0-beta1; other versions may also be vulnerable. The vulnerability is caused due to an error in the register_globals emulation layer in "grab_globals.php" where the "import_blacklist" variable is not properly protected from being overwritten. This can be exploited to execute arbitrary HTML and script code in a user's browser session in context of an affected site. http://www.phpmyadmin.net/home_page/downloads.php PROVIDED AND/OR DISCOVERED BY: Reported by vendor. -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 - -------------------------------------------------------------------------- Debian Security Advisory DSA 1207-2 security@debian.org http://www.debian.org/security/ Moritz Muehlenhoff November 19th, 2006 http://www.debian.org/security/faq - -------------------------------------------------------------------------- Package : phpmyadmin Vulnerability : several Problem-Type : remote Debian-specific: no CVE ID : CVE-2006-1678 CVE-2006-2418 CVE-2005-3621 CVE-2005-3665 CVE-2006-5116 Debian Bug : 339437 340438 362567 368082 391090 The phpmyadmin update in DSA 1207 introduced a regression. This update corrects this flaw. For completeness, the original advisory text below: Several remote vulnerabilities have been discovered in phpMyAdmin, a program to administrate MySQL over the web. CVE-2005-3665 Multiple cross-site scripting (XSS) vulnerabilities allow remote attackers to inject arbitrary web script or HTML via the (1) HTTP_HOST variable and (2) various scripts in the libraries directory that handle header generation. CVE-2006-1678 Multiple cross-site scripting (XSS) vulnerabilities allow remote attackers to inject arbitrary web script or HTML via scripts in the themes directory. CVE-2006-5116 A remote attacker could overwrite internal variables through the _FILES global variable. For the stable distribution (sarge) these problems have been fixed in version 2.6.2-3sarge3. For the upcoming stable release (etch) and unstable distribution (sid) these problems have been fixed in version 2.9.0.3-1. We recommend that you upgrade your phpmyadmin package. Upgrade Instructions - -------------------- wget url will fetch the file for you dpkg -i file.deb will install the referenced file. If you are using the apt-get package manager, use the line for sources.list as given below: apt-get update will update the internal database apt-get upgrade will install corrected packages You may use an automated update by adding the resources from the footer to the proper configuration. Debian GNU/Linux 3.1 alias sarge - -------------------------------- Source archives: http://security.debian.org/pool/updates/main/p/phpmyadmin/phpmyadmin_2.6.2-3sarge3.dsc Size/MD5 checksum: 604 32ee16f4370604bc150d93c5676fface http://security.debian.org/pool/updates/main/p/phpmyadmin/phpmyadmin_2.6.2-3sarge3.diff.gz Size/MD5 checksum: 38520 f27c4b99bbdb3dc13fb71aef99749247 http://security.debian.org/pool/updates/main/p/phpmyadmin/phpmyadmin_2.6.2.orig.tar.gz Size/MD5 checksum: 2654418 05e33121984824c43d94450af3edf267 Architecture independent components: http://security.debian.org/pool/updates/main/p/phpmyadmin/phpmyadmin_2.6.2-3sarge3_all.deb Size/MD5 checksum: 2769182 00f14fb52a14546e92ece84c16cd249f These files will probably be moved into the stable distribution on its next update. - --------------------------------------------------------------------------------- For apt-get: deb http://security.debian.org/ stable/updates main For dpkg-ftp: ftp://security.debian.org/debian-security dists/stable/updates/main Mailing list: debian-security-announce@lists.debian.org Package info: `apt-cache show <pkg>' and http://packages.debian.org/<pkg> -----BEGIN PGP SIGNATURE----- Version: GnuPG v1.4.5 (GNU/Linux) iD8DBQFFYFPdXm3vHE4uyloRAgj5AJ4k0NXBlTZgTK+vJTlgPNTEBfeBGgCg61oX s2aDzIfiBIc0hbLjIGOwEcQ= =EQpq -----END PGP SIGNATURE----- _______________________________________________ Full-Disclosure - We believe in it. Charter: http://lists.grok.org.uk/full-disclosure-charter.html Hosted and sponsored by Secunia - http://secunia.com/ . ---------------------------------------------------------------------- To improve our services to our customers, we have made a number of additions to the Secunia Advisories and have started translating the advisories to German. The improvements will help our customers to get a better understanding of how we reached our conclusions, how it was rated, our thoughts on exploitation, attack vectors, and scenarios. For more information: SA17578 SA17895 SA19556 SA20113 SA22126 SOLUTION: Apply updated packages. Some input passed to "libraries/header_http.inc.php" isn't properly sanitised before being returned to the user. This can be exploited to include arbitrary HTTP headers in a response sent to the user. Successful exploitation requires that "register_globals" is enabled. It is also possible to disclose the full path to certain scripts by accessing them directly. http://www.phpmyadmin.net/home_page/downloads.php PROVIDED AND/OR DISCOVERED BY: Toni Koivunen ORIGINAL ADVISORY: Toni Koivunen: http://www.fitsec.com/advisories/FS-05-02.txt phpMyAdmin: http://www.phpmyadmin.net/home_page/security.php?issue=PMASA-2005-6 ---------------------------------------------------------------------- About: This Advisory was delivered by Secunia as a free service to help everybody keeping their systems up to date against the latest vulnerabilities. Subscribe: http://secunia.com/secunia_security_advisories/ Definitions: (Criticality, Where etc.) http://secunia.com/about_secunia_advisories/ Please Note: Secunia recommends that you verify all advisories you receive by clicking the link. Secunia NEVER sends attached files with advisories. Secunia does not advise people to install third party patches, only use those supplied by the vendor. ---------------------------------------------------------------------- Unsubscribe: Secunia Security Advisories http://secunia.com/sec_adv_unsubscribe/?email=packet%40packetstormsecurity.org ----------------------------------------------------------------------

Trust: 1.8

sources: NVD: CVE-2005-3621 // BID: 15422 // PACKETSTORM: 43410 // PACKETSTORM: 42148 // PACKETSTORM: 42110 // PACKETSTORM: 52337 // PACKETSTORM: 51974 // PACKETSTORM: 51856 // PACKETSTORM: 41587

AFFECTED PRODUCTS

vendor:phpmyadminmodel:phpmyadminscope:eqversion:2.5.4

Trust: 1.6

vendor:phpmyadminmodel:phpmyadminscope:eqversion:2.5.7_pl1

Trust: 1.6

vendor:phpmyadminmodel:phpmyadminscope:eqversion:2.5.6_rc2

Trust: 1.6

vendor:phpmyadminmodel:phpmyadminscope:eqversion:2.5.5_pl1

Trust: 1.6

vendor:phpmyadminmodel:phpmyadminscope:eqversion:2.2.0

Trust: 1.6

vendor:phpmyadminmodel:phpmyadminscope:eqversion:2.2.7_pl1

Trust: 1.6

vendor:phpmyadminmodel:phpmyadminscope:eqversion:2.6.0_pl3

Trust: 1.6

vendor:phpmyadminmodel:phpmyadminscope:eqversion:2.6.1_pl3

Trust: 1.6

vendor:phpmyadminmodel:phpmyadminscope:eqversion:2.5.2_pl1

Trust: 1.6

vendor:phpmyadminmodel:phpmyadminscope:eqversion:2.5.3

Trust: 1.6

vendor:phpmyadminmodel:phpmyadminscope:eqversion:2.6.4_pl3

Trust: 1.0

vendor:phpmyadminmodel:phpmyadminscope:eqversion:2.6.2_pl1

Trust: 1.0

vendor:phpmyadminmodel:phpmyadminscope:eqversion:2.6.3_pl1

Trust: 1.0

vendor:sapmodel:web application serverscope:eqversion:7.0

Trust: 0.3

vendor:sapmodel:web application serverscope:eqversion:6.40

Trust: 0.3

vendor:sapmodel:web application serverscope:eqversion:6.20

Trust: 0.3

vendor:sapmodel:web application serverscope:eqversion:6.10

Trust: 0.3

vendor:s u s emodel:linux professional ossscope:eqversion:10.0

Trust: 0.3

vendor:s u s emodel:linux professional x86 64scope:eqversion:9.3

Trust: 0.3

vendor:s u s emodel:linux professionalscope:eqversion:9.3

Trust: 0.3

vendor:s u s emodel:linux professional x86 64scope:eqversion:9.2

Trust: 0.3

vendor:s u s emodel:linux professionalscope:eqversion:9.2

Trust: 0.3

vendor:s u s emodel:linux professional x86 64scope:eqversion:9.1

Trust: 0.3

vendor:s u s emodel:linux professionalscope:eqversion:9.1

Trust: 0.3

vendor:s u s emodel:linux professional x86 64scope:eqversion:9.0

Trust: 0.3

vendor:s u s emodel:linux professionalscope:eqversion:9.0

Trust: 0.3

vendor:s u s emodel:linux personal ossscope:eqversion:10.0

Trust: 0.3

vendor:s u s emodel:linux personal x86 64scope:eqversion:9.3

Trust: 0.3

vendor:s u s emodel:linux personalscope:eqversion:9.3

Trust: 0.3

vendor:s u s emodel:linux personal x86 64scope:eqversion:9.2

Trust: 0.3

vendor:s u s emodel:linux personalscope:eqversion:9.2

Trust: 0.3

vendor:s u s emodel:linux personal x86 64scope:eqversion:9.1

Trust: 0.3

vendor:s u s emodel:linux personalscope:eqversion:9.1

Trust: 0.3

vendor:s u s emodel:linux personal x86 64scope:eqversion:9.0

Trust: 0.3

vendor:s u s emodel:linux personalscope:eqversion:9.0

Trust: 0.3

vendor:phpmyadminmodel:.0-beta1scope:eqversion:2.7

Trust: 0.3

vendor:debianmodel:linux sparcscope:eqversion:3.1

Trust: 0.3

vendor:debianmodel:linux s/390scope:eqversion:3.1

Trust: 0.3

vendor:debianmodel:linux ppcscope:eqversion:3.1

Trust: 0.3

vendor:debianmodel:linux mipselscope:eqversion:3.1

Trust: 0.3

vendor:debianmodel:linux mipsscope:eqversion:3.1

Trust: 0.3

vendor:debianmodel:linux m68kscope:eqversion:3.1

Trust: 0.3

vendor:debianmodel:linux ia-64scope:eqversion:3.1

Trust: 0.3

vendor:debianmodel:linux ia-32scope:eqversion:3.1

Trust: 0.3

vendor:debianmodel:linux hppascope:eqversion:3.1

Trust: 0.3

vendor:debianmodel:linux armscope:eqversion:3.1

Trust: 0.3

vendor:debianmodel:linux amd64scope:eqversion:3.1

Trust: 0.3

vendor:debianmodel:linux alphascope:eqversion:3.1

Trust: 0.3

vendor:debianmodel:linuxscope:eqversion:3.1

Trust: 0.3

sources: BID: 15422 // CNNVD: CNNVD-200511-204 // NVD: CVE-2005-3621

CVSS

SEVERITY

CVSSV2

CVSSV3

nvd@nist.gov: CVE-2005-3621
value: MEDIUM

Trust: 1.0

CNNVD: CNNVD-200511-204
value: MEDIUM

Trust: 0.6

nvd@nist.gov: CVE-2005-3621
severity: MEDIUM
baseScore: 5.0
vectorString: AV:N/AC:L/AU:N/C:N/I:P/A:N
accessVector: NETWORK
accessComplexity: LOW
authentication: NONE
confidentialityImpact: NONE
integrityImpact: PARTIAL
availabilityImpact: NONE
exploitabilityScore: 10.0
impactScore: 2.9
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 1.0

sources: CNNVD: CNNVD-200511-204 // NVD: CVE-2005-3621

PROBLEMTYPE DATA

problemtype:NVD-CWE-Other

Trust: 1.0

sources: NVD: CVE-2005-3621

THREAT TYPE

remote

Trust: 0.7

sources: PACKETSTORM: 51974 // CNNVD: CNNVD-200511-204

TYPE

input validation

Trust: 0.6

sources: CNNVD: CNNVD-200511-204

EXTERNAL IDS

db:NVDid:CVE-2005-3621

Trust: 2.1

db:SECUNIAid:22781

Trust: 1.7

db:SECUNIAid:17578

Trust: 1.7

db:SECTRACKid:1015213

Trust: 1.6

db:SUSEid:SUSE-SR:2005:028

Trust: 0.6

db:DEBIANid:DSA-1207

Trust: 0.6

db:CNNVDid:CNNVD-200511-204

Trust: 0.6

db:BIDid:15422

Trust: 0.3

db:SECUNIAid:18618

Trust: 0.1

db:PACKETSTORMid:43410

Trust: 0.1

db:SECUNIAid:17925

Trust: 0.1

db:PACKETSTORMid:42148

Trust: 0.1

db:SECUNIAid:17895

Trust: 0.1

db:PACKETSTORMid:42110

Trust: 0.1

db:PACKETSTORMid:52337

Trust: 0.1

db:PACKETSTORMid:51974

Trust: 0.1

db:PACKETSTORMid:51856

Trust: 0.1

db:PACKETSTORMid:41587

Trust: 0.1

sources: BID: 15422 // PACKETSTORM: 43410 // PACKETSTORM: 42148 // PACKETSTORM: 42110 // PACKETSTORM: 52337 // PACKETSTORM: 51974 // PACKETSTORM: 51856 // PACKETSTORM: 41587 // CNNVD: CNNVD-200511-204 // NVD: CVE-2005-3621

REFERENCES

url:http://www.phpmyadmin.net/home_page/security.php?issue=pmasa-2005-6

Trust: 1.7

url:http://www.novell.com/linux/security/advisories/2005_28_sr.html

Trust: 1.6

url:http://www.debian.org/security/2006/dsa-1207

Trust: 1.6

url:http://securitytracker.com/id?1015213

Trust: 1.6

url:http://secunia.com/advisories/22781

Trust: 1.6

url:http://secunia.com/advisories/17578

Trust: 1.6

url:http://secunia.com/secunia_security_advisories/

Trust: 0.5

url:http://secunia.com/about_secunia_advisories/

Trust: 0.5

url:http://secunia.com/sec_adv_unsubscribe/?email=packet%40packetstormsecurity.org

Trust: 0.5

url:http://www.fitsec.com/advisories/fs-05-02.txt

Trust: 0.4

url:http://www.owasp.org/index.php/main_page

Trust: 0.3

url:http://www.sap.com

Trust: 0.3

url:/archive/1/416696

Trust: 0.3

url:/archive/1/416148

Trust: 0.3

url:http://secunia.com/advisories/17578/

Trust: 0.3

url:http://secunia.com/advisories/17895/

Trust: 0.3

url:http://secunia.com/product/1720/

Trust: 0.3

url:http://security.debian.org/pool/updates/main/p/phpmyadmin/phpmyadmin_2.6.2.orig.tar.gz

Trust: 0.3

url:http://secunia.com/advisories/17925/

Trust: 0.2

url:http://www.phpmyadmin.net/home_page/downloads.php

Trust: 0.2

url:http://secunia.com/product/1719/

Trust: 0.2

url:https://nvd.nist.gov/vuln/detail/cve-2006-1678

Trust: 0.2

url:http://packages.debian.org/<pkg>

Trust: 0.2

url:https://nvd.nist.gov/vuln/detail/cve-2006-5116

Trust: 0.2

url:http://security.debian.org/

Trust: 0.2

url:https://nvd.nist.gov/vuln/detail/cve-2006-2418

Trust: 0.2

url:http://www.debian.org/security/faq

Trust: 0.2

url:http://www.debian.org/security/

Trust: 0.2

url:https://nvd.nist.gov/vuln/detail/cve-2005-3665

Trust: 0.2

url:https://nvd.nist.gov/vuln/detail/cve-2005-3621

Trust: 0.2

url:http://security.debian.org/pool/updates/main/p/phpmyadmin/phpmyadmin_2.6.2-3sarge2_all.deb

Trust: 0.2

url:http://security.debian.org/pool/updates/main/p/phpmyadmin/phpmyadmin_2.6.2-3sarge2.diff.gz

Trust: 0.2

url:http://security.debian.org/pool/updates/main/p/phpmyadmin/phpmyadmin_2.6.2-3sarge2.dsc

Trust: 0.2

url:http://secunia.com/product/4258/

Trust: 0.1

url:http://secunia.com/product/4933/

Trust: 0.1

url:http://secunia.com/product/2467/

Trust: 0.1

url:http://lists.suse.com/archive/suse-security-announce/2006-jan/0006.html

Trust: 0.1

url:http://secunia.com/product/6221/

Trust: 0.1

url:http://secunia.com/advisories/18618/

Trust: 0.1

url:http://secunia.com/product/3473/

Trust: 0.1

url:http://www.hardened-php.net/advisory_252005.110.html

Trust: 0.1

url:http://secunia.com/advisories/17289/

Trust: 0.1

url:http://sourceforge.net/project/showfiles.php?group_id=23067

Trust: 0.1

url:http://www.phpmyadmin.net/home_page/security.php?issue=pmasa-2005-8

Trust: 0.1

url:http://security.debian.org/pool/updates/main/p/phpmyadmin/phpmyadmin_2.6.2-3sarge3_all.deb

Trust: 0.1

url:http://security.debian.org/pool/updates/main/p/phpmyadmin/phpmyadmin_2.6.2-3sarge3.diff.gz

Trust: 0.1

url:http://secunia.com/

Trust: 0.1

url:http://lists.grok.org.uk/full-disclosure-charter.html

Trust: 0.1

url:http://security.debian.org/pool/updates/main/p/phpmyadmin/phpmyadmin_2.6.2-3sarge3.dsc

Trust: 0.1

url:http://secunia.com/advisories/22781/

Trust: 0.1

url:http://secunia.com/advisories/19556/

Trust: 0.1

url:http://corporate.secunia.com/products/48/?r=l

Trust: 0.1

url:http://secunia.com/product/530/

Trust: 0.1

url:http://www.us.debian.org/security/2006/dsa-1207

Trust: 0.1

url:http://secunia.com/advisories/20113/

Trust: 0.1

url:http://secunia.com/product/5307/

Trust: 0.1

url:http://corporate.secunia.com/how_to_buy/15/?r=l

Trust: 0.1

url:http://secunia.com/advisories/22126/

Trust: 0.1

sources: BID: 15422 // PACKETSTORM: 43410 // PACKETSTORM: 42148 // PACKETSTORM: 42110 // PACKETSTORM: 52337 // PACKETSTORM: 51974 // PACKETSTORM: 51856 // PACKETSTORM: 41587 // CNNVD: CNNVD-200511-204 // NVD: CVE-2005-3621

CREDITS

Toni Koivunen is credited with the discovery of this vulnerability.

Trust: 0.9

sources: BID: 15422 // CNNVD: CNNVD-200511-204

SOURCES

db:BIDid:15422
db:PACKETSTORMid:43410
db:PACKETSTORMid:42148
db:PACKETSTORMid:42110
db:PACKETSTORMid:52337
db:PACKETSTORMid:51974
db:PACKETSTORMid:51856
db:PACKETSTORMid:41587
db:CNNVDid:CNNVD-200511-204
db:NVDid:CVE-2005-3621

LAST UPDATE DATE

2024-08-14T13:04:05.792000+00:00


SOURCES UPDATE DATE

db:BIDid:15422date:2007-01-12T22:30:00
db:CNNVDid:CNNVD-200511-204date:2005-11-16T00:00:00
db:NVDid:CVE-2005-3621date:2008-09-05T20:54:49.227

SOURCES RELEASE DATE

db:BIDid:15422date:2005-11-09T00:00:00
db:PACKETSTORMid:43410date:2006-01-27T06:43:36
db:PACKETSTORMid:42148date:2005-12-07T17:36:35
db:PACKETSTORMid:42110date:2005-12-07T01:44:11
db:PACKETSTORMid:52337date:2006-11-20T16:15:03
db:PACKETSTORMid:51974date:2006-11-13T15:36:34
db:PACKETSTORMid:51856date:2006-11-10T16:02:24
db:PACKETSTORMid:41587date:2005-11-19T21:56:12
db:CNNVDid:CNNVD-200511-204date:2005-11-16T00:00:00
db:NVDid:CVE-2005-3621date:2005-11-16T11:02:00