FreeBSD VuXML: Documenting security issues in FreeBSD and the FreeBSD Ports Collection

phpmyadmin -- multiple vulnerabilities

Affected packages
4.6.0 <= phpmyadmin < 4.6.4

Details

VuXML ID ef70b201-645d-11e6-9cdc-6805ca0b3d42
Discovery 2016-08-17
Entry 2016-08-17

The phpmyadmin development team reports:

Weakness with cookie encryption

Multiple XSS vulnerabilities

Multiple XSS vulnerabilities

PHP code injection

Full path disclosure

SQL injection attack

Local file exposure

Local file exposure through symlinks with UploadDir

Path traversal with SaveDir and UploadDir

Multiple XSS vulnerabilities

SQL injection attack

SQL injection attack

Denial of service (DOS) attack in transformation feature

SQL injection attack as control user

Unvalidated data passed to unserialize()

DOS attack with forced persistent connections

Denial of service (DOS) attack by for loops

IPv6 and proxy server IP-based authentication rule circumvention

Detect if user is logged in

Bypass URL redirect protection

Referrer leak in url.php

Reflected File Download attack

ArbitraryServerRegexp bypass

Denial of service (DOS) attack by changing password to a very long string

Remote code execution vulnerability when run as CGI

Summary

Denial of service (DOS) attack with dbase extension

Remote code execution vulnerability when PHP is running with dbase extension

References

CVE Name CVE-2016-6606
CVE Name CVE-2016-6607
CVE Name CVE-2016-6608
CVE Name CVE-2016-6609
CVE Name CVE-2016-6610
CVE Name CVE-2016-6611
CVE Name CVE-2016-6612
CVE Name CVE-2016-6613
CVE Name CVE-2016-6614
CVE Name CVE-2016-6615
CVE Name CVE-2016-6616
CVE Name CVE-2016-6617
CVE Name CVE-2016-6618
CVE Name CVE-2016-6619
CVE Name CVE-2016-6620
CVE Name CVE-2016-6622
CVE Name CVE-2016-6623
CVE Name CVE-2016-6624
CVE Name CVE-2016-6625
CVE Name CVE-2016-6626
CVE Name CVE-2016-6627
CVE Name CVE-2016-6628
CVE Name CVE-2016-6629
CVE Name CVE-2016-6630
CVE Name CVE-2016-6631
CVE Name CVE-2016-6632
CVE Name CVE-2016-6633
URL https://www.phpmyadmin.net/security/PMASA-2016-29/
URL https://www.phpmyadmin.net/security/PMASA-2016-30/
URL https://www.phpmyadmin.net/security/PMASA-2016-31/
URL https://www.phpmyadmin.net/security/PMASA-2016-32/
URL https://www.phpmyadmin.net/security/PMASA-2016-33/
URL https://www.phpmyadmin.net/security/PMASA-2016-34/
URL https://www.phpmyadmin.net/security/PMASA-2016-35/
URL https://www.phpmyadmin.net/security/PMASA-2016-36/
URL https://www.phpmyadmin.net/security/PMASA-2016-37/
URL https://www.phpmyadmin.net/security/PMASA-2016-38/
URL https://www.phpmyadmin.net/security/PMASA-2016-39/
URL https://www.phpmyadmin.net/security/PMASA-2016-40/
URL https://www.phpmyadmin.net/security/PMASA-2016-41/
URL https://www.phpmyadmin.net/security/PMASA-2016-42/
URL https://www.phpmyadmin.net/security/PMASA-2016-43/
URL https://www.phpmyadmin.net/security/PMASA-2016-45/
URL https://www.phpmyadmin.net/security/PMASA-2016-46/
URL https://www.phpmyadmin.net/security/PMASA-2016-47/
URL https://www.phpmyadmin.net/security/PMASA-2016-48/
URL https://www.phpmyadmin.net/security/PMASA-2016-49/
URL https://www.phpmyadmin.net/security/PMASA-2016-50/
URL https://www.phpmyadmin.net/security/PMASA-2016-51/
URL https://www.phpmyadmin.net/security/PMASA-2016-52/
URL https://www.phpmyadmin.net/security/PMASA-2016-53/
URL https://www.phpmyadmin.net/security/PMASA-2016-54/
URL https://www.phpmyadmin.net/security/PMASA-2016-55/
URL https://www.phpmyadmin.net/security/PMASA-2016-56/