Skip to content

GitLab

  • Projects
  • Groups
  • Snippets
  • Help
    • Loading...
  • Help
    • Help
    • Support
    • Community forum
    • Submit feedback
    • Contribute to GitLab
  • Sign in / Register
aports
aports
  • Project overview
    • Project overview
    • Details
    • Activity
    • Releases
  • Repository
    • Repository
    • Files
    • Commits
    • Branches
    • Tags
    • Contributors
    • Graph
    • Compare
  • Issues 649
    • Issues 649
    • List
    • Boards
    • Labels
    • Service Desk
    • Milestones
  • Merge Requests 204
    • Merge Requests 204
  • CI / CD
    • CI / CD
    • Pipelines
    • Jobs
    • Schedules
  • Operations
    • Operations
    • Incidents
    • Environments
  • Analytics
    • Analytics
    • CI / CD
    • Repository
    • Value Stream
  • Members
    • Members
  • Collapse sidebar
  • Activity
  • Graph
  • Create a new issue
  • Jobs
  • Commits
  • Issue Boards
  • alpine
  • aportsaports
  • Issues
  • #9092

Closed
Open
Opened Jul 16, 2018 by Alicha CH@alichaReporter

[3.9] phpmyadmin: Multiple vulnerabilities (CVE-2018-12581, CVE-2018-12613)

CVE-2018-12581: XSS in Designer feature

A Cross-Site Scripting vulnerability was found in the Designer feature, where an attacker can
deliver a payload to a user through a specially-crafted database name.

Affected Versions:

phpMyAdmin versions prior to 4.8.2.

Reference:

https://www.phpmyadmin.net/security/PMASA-2018-3/

Patch:

https://github.com/phpmyadmin/phpmyadmin/commit/6943fff87324bd54c3a37a5160a5fb77498c355e

CVE-2018-12613: File inclusion and remote code execution attack

A flaw has been discovered where an attacker can include (view and potentially execute) files on the server.
The vulnerability comes from a portion of code where pages are redirected and loaded within phpMyAdmin, and an improper test for whitelisted pages.
An attacker must be authenticated, except in these situations:

  • $cfg[‘AllowArbitraryServer’] = true: attacker can specify any host he/she is already in control of, and execute arbitrary code on phpMyAdmin
  • $cfg[‘ServerDefault’] = 0: this bypasses the login and runs the vulnerable code without any authentication

Affected Versions:

phpMyAdmin 4.8.0 and 4.8.1 are affected.

Reference:

https://www.phpmyadmin.net/security/PMASA-2018-4/

Patch:

https://github.com/phpmyadmin/phpmyadmin/commit/7662d02939fb3cf6f0d9ec32ac664401dcfe7490

(from redmine: issue id 9092, created on 2018-07-16, closed on 2018-07-17)

  • Relations:
    • copied_to #9091 (closed)
    • parent #9091 (closed)
  • Changesets:
    • Revision 7b247d9a by Natanael Copa on 2018-07-16T17:52:52Z:
community/phpmyadmin: security upgrade to 4.8.2 (CVE-2018-12581,CVE-2018-12613)

fixes #9092
To upload designs, you'll need to enable LFS and have admin enable hashed storage. More information
Assignee
Assign to
3.9.0
Milestone
3.9.0 (Past due)
Assign milestone
Time tracking
None
Due date
None
Reference: alpine/aports#9092