Gentoo Websites Logo
Go to: Gentoo Home Documentation Forums Lists Bugs Planet Store Wiki Get Gentoo!
Bug 98328 - dev-db/phppgadmin: Input Validation Hole in 'formLanguage' (CAN-2005-2256)
Summary: dev-db/phppgadmin: Input Validation Hole in 'formLanguage' (CAN-2005-2256)
Status: RESOLVED FIXED
Alias: None
Product: Gentoo Security
Classification: Unclassified
Component: Vulnerabilities (show other bugs)
Hardware: All Linux
: High minor (vote)
Assignee: Gentoo Security
URL: http://securitytracker.com/alerts/200...
Whiteboard: C3 [noglsa] jaervosz
Keywords:
Depends on:
Blocks:
 
Reported: 2005-07-08 02:55 UTC by Matthias Geerdsen (RETIRED)
Modified: 2005-07-26 12:38 UTC (History)
2 users (show)

See Also:
Package list:
Runtime testing required: ---


Attachments

Note You need to log in before you can comment on or make changes to this bug.
Description Matthias Geerdsen (RETIRED) gentoo-dev 2005-07-08 02:55:02 UTC
phpPgAdmin Input Validation Hole in 'formLanguage' Discloses Files to Remote Users
SecurityTracker Alert ID:  1014414
SecurityTracker URL:  http://securitytracker.com/id?1014414
CVE Reference:  GENERIC-MAP-NOMATCH   (Links to External Site)
Date:  Jul 7 2005
Impact:  Disclosure of system information, Disclosure of user information
Exploit Included:  Yes  
Version(s): 3.5.3 and prior versions
Description:  A vulnerability was reported in phpPgAdmin. A remote user can view files on the target system.

The script does not properly validate user-supplied input in the 'formLanguage' parameter. A remote user can supply a specially crafted parameter value containing encoded directory traversal characters to view files on the target system.

A demonstration exploit URL is provided:

formUsername=username&formPassword=password&formServer=0
&formLanguage=%2e%2e%2f%2e%2e%2f%2e%2e%2f%2e%2e%2f%2e%2e%2f%2e%2e%2f%2e%2e%2f/etc/pa sswd%00&submitLogin=Login

SecurityFocus reported this vulnerability. No credit was provided.
Impact:  A remote user can view files on the target system with the privileges of the target web service.
Solution:  No solution was available at the time of this entry.
Vendor URL:  phppgadmin.sourceforge.net/ (Links to External Site)
Cause:  Input validation error 

_______

postgresql/web-apps pls validate/advise
Comment 1 Matthias Geerdsen (RETIRED) gentoo-dev 2005-07-08 02:56:05 UTC
oops... stupid me... reassigning ;-)
Comment 2 Thierry Carrez (RETIRED) gentoo-dev 2005-07-18 05:11:36 UTC
 Version 3.5.4
 -------------
 
 Bugs
 * Fix security hole in include() of language file:
    http://secunia.com/advisories/15941/
   Check now requires that the language filename be in the list
   of known allowed filenames.
 * Fix that functions returning cstring were not being listed
 * Make parsing of PostgreSQL 1-dimensional arrays correct.  Makes
   named function parameter use more reliable.
 * Fix downloading of the results of multiline queries.

Postgres / web-apps peeps : anyone interested in herding that package and bump
to the secure version ? We'll probably remove it from portage if noone takes it.
Comment 3 Thierry Carrez (RETIRED) gentoo-dev 2005-07-18 07:36:30 UTC
--------------------------------------------------------------------------
Debian Security Advisory DSA 759-1                     security@debian.org
http://www.debian.org/security/                             Martin Schulze
July 18th, 2005                         http://www.debian.org/security/faq
--------------------------------------------------------------------------

Package        : phppgadmin
Vulnerability  : missing input sanitising
Problem-Type   : remote
Debian-specific: no
CVE ID         : CAN-2005-2256
BugTraq ID     : 14142

A vulnerability has been discovered in phppgadmin, a set of PHP
scripts to administrate PostgreSQL over the WWW, that can lead to
disclose sensitive information.  Successful exploitation requires that
"magic_quotes_gpc" is disabled.
Comment 4 Renat Lumpau (RETIRED) gentoo-dev 2005-07-18 07:49:06 UTC
mholzer already bumped it to 3.5.4 on 15-Jul-2005
Comment 5 Thierry Carrez (RETIRED) gentoo-dev 2005-07-18 07:53:33 UTC
Oops. In fact it was already inportage.

Arches, please test and mark stable :
Target KEYWORDS="x86 ppc sparc hppa amd64"
Comment 6 Gustavo Zacarias (RETIRED) gentoo-dev 2005-07-18 08:47:30 UTC
sparc stable.
Comment 7 Tobias Scherbaum (RETIRED) gentoo-dev 2005-07-19 04:38:34 UTC
ppc stable
Comment 8 René Nussbaumer (RETIRED) gentoo-dev 2005-07-19 11:26:41 UTC
Stable on hppa
Comment 9 Renat Lumpau (RETIRED) gentoo-dev 2005-07-20 05:15:04 UTC
x86 stable
Comment 10 Danny van Dyk (RETIRED) gentoo-dev 2005-07-20 15:21:33 UTC
Sorry for the delay, stable on amd64.
Comment 11 Stefan Cornelius (RETIRED) gentoo-dev 2005-07-20 15:23:39 UTC
Ready for GLSA vote. I've no opinion yet.
Comment 12 Sune Kloppenborg Jeppesen (RETIRED) gentoo-dev 2005-07-20 22:15:52 UTC
AFAIR magic_quotes_gpc is enabled by default -> downgrading severity. 
 
I tend to vote NO. 
Comment 13 Stefan Cornelius (RETIRED) gentoo-dev 2005-07-23 05:05:44 UTC
1/2 No.
Comment 14 Thierry Carrez (RETIRED) gentoo-dev 2005-07-26 12:38:17 UTC
1/2 not too... closing.