Quoting $URL: Summary: Code execution vulnerability Description: We received an advisory from Norman Hippert and we wish to thank him for his work. The server_databases.php script was vulnerable to an attack coming from a user who is already logged-on to phpMyAdmin, where he can execute shell code (if the PHP configuration permits commands like exec). Severity: We consider this vulnerability to be serious. Affected versions: Versions before 2.11.9.1. Solution: Upgrade to phpMyAdmin 2.11.9.1 or newer. --- References: http://fd.the-wildcat.de/pma_e36a091q11.php http://www.openwall.com/lists/oss-security/2008/09/15/2
Maintainers, please bump.
CVE-2008-4096 (http://nvd.nist.gov/nvd.cfm?cvename=CVE-2008-4096): libraries/database_interface.lib.php in phpMyAdmin before 2.11.9.1 allows remote authenticated users to execute arbitrary code via a request to server_databases.php with a sort_by parameter containing PHP sequences, which are processed by create_function.
Maintainers, please bump. We have a target delay of 5 days for B1 issues.
phpmyadmin-2.11.9.1 is in the tree. Sorry for the delay.
Arches, please test and mark stable: =dev-db/phpmyadmin-2.11.9.1 Target keywords : "alpha amd64 hppa ppc ppc64 sparc x86"
ppc done
ppc64 done
alpha/sparc/x86 stable
Stable for HPPA.
amd64 stable
All arches done, request filed.
Removed phpmyadmin-2.11.8, -2.11.8.1. webapps done
GLSA 200903-32