phpMyAdmin Multiple Vulnerabilities Fixed by 4.0.10.15, 4.4.15.4 and 4.5.5.1


Description   (#Several vulnerabilities were reported in phpMyAdmin:#- CVE-2016-2559: cross-site scripting in the "format()" function of the "libraries/sql-parser/src/Utils/Error.php" web page in the SQL parser##- CVE-2016-2560: multiple cross-site scripting. These vulnerabilities are exploitable via a crafted Host HTTP header (libraries/Config.class.php), crafted JSON data (file_echo.php), a crafted SQL query (js/functions.js), a crafted "initial parameter" in the user accounts page or a crafted "it" parameter in the zoom search page##- CVE-2016-2561: multiple cross-site scripting. These vulnerabilities are exploitable via "normalization.php", "js/normalization.js" in the database normalization page, "templates/database/structure/sortable_header.phtml" in the database structure page or the "pos" parameter to "db_central_columns.php" in the central columns page##- CVE-2016-2562: improper X.509 certificate validation from "api.github.com" allowing man-in-the-middle attack##The phpmyadmin packages provided by Debian Squeeze 6 are vulnerable.##The phpmyadmin packages provided by Debian Wheezy 7 are vulnerable to CVE-2016-2560.##The phpmyadmin packages provided by Debian Jessie 8 are vulnerable to CVE-2016-2560 and CVE-2016-2561.)
     
Vulnerable Products   Vulnerable OS:
Fedora (Red Hat) - 22, 23FreeBSD (FreeBSD) - AllGNU/Linux (Debian) - 6, 7, 8openSUSE (SUSE) - 13.1Vulnerable Software:
PhpMyAdmin (PhpMyAdmin) - 4.0, 4.4.x, 4.5
     
Solution   Fixed phpmyadmin packages for Debian Jessie 8 are available (CVE-2016-2560, CVE-2016-2561).
     
CVE   CVE-2016-2562
CVE-2016-2561
CVE-2016-2560
CVE-2016-2559
     
References   - PMASA-2016-10 : XSS vulnerability in SQL parser
https://www.phpmyadmin.net/security/PMASA-2016-10/
- PMASA-2016-11 : Multiple XSS vulnerabilities
https://www.phpmyadmin.net/security/PMASA-2016-11/
- PMASA-2016-12 : Multiple XSS vulnerabilities
https://www.phpmyadmin.net/security/PMASA-2016-12/
- PMASA-2016-13 : Vulnerability allowing man-in-the-middle attack on API call to GitHub
https://www.phpmyadmin.net/security/PMASA-2016-13/
- Debian Security Tracker : phpmyadmin
https://security-tracker.debian.org/tracker/CVE-2016-2559
https://security-tracker.debian.org/tracker/CVE-2016-2560
https://security-tracker.debian.org/tracker/CVE-2016-2561
https://security-tracker.debian.org/tracker/CVE-2016-2562
- VuXML : phpmyadmin -- multiple XSS and a man-in-the-middle vulnerability
http://www.vuxml.org/freebsd/f682a506-df7c-11e5-81e4-6805ca0b3d42.html
- FEDORA-2016-65 : Fedora 23 Update: php-udan11-sql-parser-3.4.0-1.fc23
https://lists.fedoraproject.org/pipermail/package-announce/2016-March/178564.html
- openSUSE-SU-2016:0666-1 : Security update for phpMyAdmin
https://lists.opensuse.org/opensuse-updates/2016-03/msg00020.html
- FEDORA-2016-65 : Fedora 23 Update: phpMyAdmin-4.5.5.1-1.fc23
https://lists.fedoraproject.org/pipermail/package-announce/2016-March/178562.html
- FEDORA-2016-02 : Fedora 22 Update: phpMyAdmin-4.5.5.1-1.fc22
https://lists.fedoraproject.org/pipermail/package-announce/2016-March/178869.html
- FEDORA-2016-02 : Fedora 22 Update: php-udan11-sql-parser-3.4.0-1.fc22
https://lists.fedoraproject.org/pipermail/package-announce/2016-March/178872.html
- DLA 481-1 : phpmyadmin security update
https://lists.debian.org/debian-lts-announce/2016/05/msg00033.html
- DLA 481-2 : phpmyadmin regression update
https://lists.debian.org/debian-lts-announce/2016/05/msg00048.html
- DSA 3627-1 : phpmyadmin security update
https://lists.debian.org/debian-security-announce/2016/msg00205.html
     
Vulnerability Manager Detection   No
     
IPS Protection  
ASQ Engine alarm Available Since
XSS - Prevention - POST : suspicious 'meta' tag found in data
3.2.0
XSS - Prevention - POST : suspicious 'img' attribute found in data
3.2.0
XSS - Prevention - POST : suspicious 'style' tag found in data
5.0.0
XSS - Prevention - POST : javascript code found in data
5.0.0
XSS - Prevention - POST : suspicious tag with event found in data
5.0.0
XSS - Prevention - POST : suspicious 'embed' tag found in data
5.0.0
XSS - Prevention - POST : 'location' javascript object found in data
5.0.0
XSS - Prevention - POST : code allowing cookie access found in data
5.0.0
XSS - Prevention - POST : 'script' tag found in data
5.0.0
XSS - Prevention : suspicious 'script' tag found in header
5.0.0
XSS - Prevention - POST : suspicious 'style' attribute found in data
5.0.0
XSS - Prevention - POST : suspicious 'applet' tag found in data
5.0.0
XSS - Prevention - POST : suspicious 'div' tag found in data
5.0.0
XSS - Prevention - POST : suspicious 'img' attribute found in data
5.0.0
XSS - Prevention - POST : suspicious 'meta' tag found in data
5.0.0
XSS - Prevention - POST : suspicious 'object' tag found in data
5.0.0
XSS - Prevention - POST : suspicious 'iframe' tag found in data
5.0.0
     


 
 
 
 
 Risk level 
Moderate 

 Vulnerability First Public Report Date 
2016-02-25 

 Target Type 
Server 

 Possible exploit 
Remote