First published: Fri Jan 19 2007(Updated: )
PhpMyAdmin before 2.9.1.1 allows remote attackers to obtain the full server path via direct requests to (a) scripts/check_lang.php and (b) themes/darkblue_orange/layout.inc.php; and via the (1) lang[], (2) target[], (3) db[], (4) goto[], (5) table[], and (6) tbl_group[] array arguments to (c) index.php, and the (7) back[] argument to (d) sql.php; and an invalid (8) sort_by parameter to (e) server_databases.php and (9) db parameter to (f) db_printview.php.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
phpMyAdmin phpMyAdmin | =2.9.1_rc2 | |
phpMyAdmin phpMyAdmin | =2.9.0.1 | |
phpMyAdmin phpMyAdmin | =2.9.0.2 | |
phpMyAdmin phpMyAdmin | =2.9.0_rc1 | |
phpMyAdmin phpMyAdmin | =2.9.0 | |
phpMyAdmin phpMyAdmin | =2.9.0.3 | |
phpMyAdmin phpMyAdmin | <=2.9.1 | |
phpMyAdmin phpMyAdmin | =2.9.1_rc1 | |
phpMyAdmin phpMyAdmin | =2.9.0_beta1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.