Skip to main navigation Skip to main content Skip to page footer

Multiple vulnerabilities in extension phpMyAdmin (phpmyadmin)

It has been discovered that the extension phpMyAdmin (phpmyadmin) is vulnerable to Local file inclusion.

Component Type: Third party extension. This extension is not a part of the TYPO3 default installation.

Affected Versions: Version 4.11.8 and below

Vulnerability Type: Local file inclusion

Severity: Low

Suggested CVSS v2.0: AV:N/AC:H/Au:S/C:P/I:P/A:N/E:F/RL:OF/RC:C (What's that?)

References: PMASA-2011-17

Release Date: November 15, 2011

 

Problem Description: Importing a specially-crafted XML file which contains an XML entity injection permits to retrieve a local file (limited by the privileges of the user running the web server).

Solution: An updated version 4.11.9 is available from the TYPO3 extension manager and attypo3.org/extensions/repository/view/phpmyadmin/4.11.9/. Users of the extension are advised to update the extension.

Note: The TYPO3 Security Team requests TYPO3 administrators to consider our advice from TYPO3-SA-2009-015 to either use extension phpMyAdmin only on development servers or to use the phpMyAdmin standalone application on production servers.

Credits: The vendor of the phpMyAdmin upstream software credits Jan Lieskovsky. Thanks to Andreas Beutel for providing a TYPO3 extension package with an updated phpMyAdmin version.

 

General advice: Follow the recommendations that are given in the TYPO3 Security Cookbook. Please subscribe to thetypo3-announce mailing list to receive future Security Bulletins via E-mail.