Computer Security
[EN] no-pyccku

Daily web applications security vulnerabilities summary (PHP, ASP, JSP, CGI, Perl)
updated since 27.04.2008
SecurityVulns ID:8950
Threat Level:
Description:PHP inclusions, SQL injections, directory traversals, crossite scripting, information leaks, etc.
Affected:PHPMYADMIN : phpmyadmin 2.9
 WORDPRESS : Wordpress 2.5
CVE:CVE-2008-1930 (The cookie authentication method in WordPress 2.5 relies on a hash of a concatenated string containing USERNAME and EXPIRY_TIME, which allows remote attackers to forge cookies by registering a username that results in the same concatenated string, as demonstrated by registering usernames beginning with "admin" to obtain administrator privileges, aka a "cryptographic splicing" issue. NOTE: this vulnerability exists because of an incomplete fix for CVE-2007-6013.)
 CVE-2008-1924 (Unspecified vulnerability in phpMyAdmin before, when running on shared hosts, allows attackers with CREATE table permissions to read arbitrary files via a crafted HTTP POST request, related to use of an undefined UploadDir variable.)
 CVE-2008-1567 (phpMyAdmin before stores the MySQL (1) username and (2) password, and the (3) Blowfish secret key, in cleartext in a Session file under /tmp, which allows local users to obtain sensitive information.)
 CVE-2008-1149 (phpMyAdmin before 2.11.5 accesses $_REQUEST to obtain some parameters instead of $_GET and $_POST, which allows attackers in the same domain to override certain variables and conduct SQL injection and Cross Site Request Forgery (CSRF) attacks by using crafed cookies.)
Original documentdocumentDEBIAN, [SECURITY] [DSA 1557-1] New phpmyadmin packages fix several vulnerabilities (27.04.2008)
 documentSteven J. Murdoch, Wordpress 2.5 Cookie Integrity Protection Vulnerability (27.04.2008)
 documentjplopezy_(at), GroupWise 7 attached bugs (27.04.2008)

About | Terms of use | Privacy Policy
© SecurityVulns, 3APA3A, Vladimir Dubrovin
Nizhny Novgorod