Vulnerabilities > CVE-2014-9218 - Resource Management Errors vulnerability in PHPmyadmin

047910
CVSS 5.0 - MEDIUM
Attack vector
NETWORK
Attack complexity
LOW
Privileges required
NONE
Confidentiality impact
NONE
Integrity impact
NONE
Availability impact
PARTIAL
network
low complexity
phpmyadmin
CWE-399
nessus
exploit available

Summary

libraries/common.inc.php in phpMyAdmin 4.0.x before 4.0.10.7, 4.1.x before 4.1.14.8, and 4.2.x before 4.2.13.1 allows remote attackers to cause a denial of service (resource consumption) via a long password.

Vulnerable Configurations

Part Description Count
Application
Phpmyadmin
53

Common Weakness Enumeration (CWE)

Exploit-Db

descriptionphpMyAdmin 4.0.x / 4.1.x / 4.2.x - DoS. CVE-2014-9218. Dos exploit for php platform
idEDB-ID:35539
last seen2016-02-04
modified2014-12-15
published2014-12-15
reporterJaver Nieto and Andres Rojas
sourcehttps://www.exploit-db.com/download/35539/
titlephpMyAdmin 4.0.x / 4.1.x / 4.2.x - DoS

Nessus

  • NASL familyFedora Local Security Checks
    NASL idFEDORA_2014-16358.NASL
    descriptionphpMyAdmin 4.2.13.1 (2014-12-03) ================================ - [security] XSS vulnerability in redirection mechanism - [security] DOS attack with long passwords Note that Tenable Network Security has extracted the preceding description block directly from the Fedora security advisory. Tenable has attempted to automatically clean and format it as much as possible without introducing additional issues.
    last seen2020-03-17
    modified2014-12-15
    plugin id79936
    published2014-12-15
    reporterThis script is Copyright (C) 2014-2020 Tenable Network Security, Inc.
    sourcehttps://www.tenable.com/plugins/nessus/79936
    titleFedora 20 : phpMyAdmin-4.2.13.1-1.fc20 (2014-16358)
    code
    #%NASL_MIN_LEVEL 80502
    #
    # (C) Tenable Network Security, Inc.
    #
    # The descriptive text and package checks in this plugin were  
    # extracted from Fedora Security Advisory 2014-16358.
    #
    
    include("compat.inc");
    
    if (description)
    {
      script_id(79936);
      script_version("1.4");
      script_set_attribute(attribute:"plugin_modification_date", value:"2020/03/12");
    
      script_cve_id("CVE-2014-9218", "CVE-2014-9219");
      script_bugtraq_id(71434, 71435);
      script_xref(name:"FEDORA", value:"2014-16358");
    
      script_name(english:"Fedora 20 : phpMyAdmin-4.2.13.1-1.fc20 (2014-16358)");
      script_summary(english:"Checks rpm output for the updated package.");
    
      script_set_attribute(
        attribute:"synopsis", 
        value:"The remote Fedora host is missing a security update."
      );
      script_set_attribute(
        attribute:"description", 
        value:
    "phpMyAdmin 4.2.13.1 (2014-12-03) ================================
    
      - [security] XSS vulnerability in redirection mechanism
    
        - [security] DOS attack with long passwords
    
    Note that Tenable Network Security has extracted the preceding
    description block directly from the Fedora security advisory. Tenable
    has attempted to automatically clean and format it as much as possible
    without introducing additional issues."
      );
      script_set_attribute(
        attribute:"see_also",
        value:"https://bugzilla.redhat.com/show_bug.cgi?id=1170597"
      );
      script_set_attribute(
        attribute:"see_also",
        value:"https://bugzilla.redhat.com/show_bug.cgi?id=1170604"
      );
      # https://lists.fedoraproject.org/pipermail/package-announce/2014-December/145885.html
      script_set_attribute(
        attribute:"see_also",
        value:"http://www.nessus.org/u?ae279afb"
      );
      script_set_attribute(
        attribute:"solution", 
        value:"Update the affected phpMyAdmin package."
      );
      script_set_cvss_base_vector("CVSS2#AV:N/AC:L/Au:N/C:N/I:N/A:P");
      script_set_cvss_temporal_vector("CVSS2#E:ND/RL:OF/RC:C");
      script_set_attribute(attribute:"exploitability_ease", value:"No known exploits are available");
      script_set_attribute(attribute:"exploit_available", value:"false");
    
      script_set_attribute(attribute:"plugin_type", value:"local");
      script_set_attribute(attribute:"cpe", value:"p-cpe:/a:fedoraproject:fedora:phpMyAdmin");
      script_set_attribute(attribute:"cpe", value:"cpe:/o:fedoraproject:fedora:20");
    
      script_set_attribute(attribute:"patch_publication_date", value:"2014/12/06");
      script_set_attribute(attribute:"plugin_publication_date", value:"2014/12/15");
      script_end_attributes();
    
      script_category(ACT_GATHER_INFO);
      script_copyright(english:"This script is Copyright (C) 2014-2020 Tenable Network Security, Inc.");
      script_family(english:"Fedora Local Security Checks");
    
      script_dependencies("ssh_get_info.nasl");
      script_require_keys("Host/local_checks_enabled", "Host/RedHat/release", "Host/RedHat/rpm-list");
    
      exit(0);
    }
    
    
    include("audit.inc");
    include("global_settings.inc");
    include("rpm.inc");
    
    if (!get_kb_item("Host/local_checks_enabled")) audit(AUDIT_LOCAL_CHECKS_NOT_ENABLED);
    release = get_kb_item("Host/RedHat/release");
    if (isnull(release) || "Fedora" >!< release) audit(AUDIT_OS_NOT, "Fedora");
    os_ver = eregmatch(pattern: "Fedora.*release ([0-9]+)", string:release);
    if (isnull(os_ver)) audit(AUDIT_UNKNOWN_APP_VER, "Fedora");
    os_ver = os_ver[1];
    if (! ereg(pattern:"^20([^0-9]|$)", string:os_ver)) audit(AUDIT_OS_NOT, "Fedora 20.x", "Fedora " + os_ver);
    
    if (!get_kb_item("Host/RedHat/rpm-list")) audit(AUDIT_PACKAGE_LIST_MISSING);
    
    cpu = get_kb_item("Host/cpu");
    if (isnull(cpu)) audit(AUDIT_UNKNOWN_ARCH);
    if ("x86_64" >!< cpu && cpu !~ "^i[3-6]86$") audit(AUDIT_LOCAL_CHECKS_NOT_IMPLEMENTED, "Fedora", cpu);
    
    flag = 0;
    if (rpm_check(release:"FC20", reference:"phpMyAdmin-4.2.13.1-1.fc20")) flag++;
    
    
    if (flag)
    {
      if (report_verbosity > 0) security_warning(port:0, extra:rpm_report_get());
      else security_warning(0);
      exit(0);
    }
    else
    {
      tested = pkg_tests_get();
      if (tested) audit(AUDIT_PACKAGE_NOT_AFFECTED, tested);
      else audit(AUDIT_PACKAGE_NOT_INSTALLED, "phpMyAdmin");
    }
    
  • NASL familyDebian Local Security Checks
    NASL idDEBIAN_DLA-336.NASL
    descriptionSeveral issues have been fixed in phpMyAdmin, the web administration tool for MySQL. CVE-2014-8958 Multiple cross-site scripting (XSS) vulnerabilities. CVE-2014-9218 Denial of service (resource consumption) via a long password. CVE-2015-2206 Risk of BREACH attack due to reflected parameter. CVE-2015-3902 XSRF/CSRF vulnerability in phpMyAdmin setup. NOTE: Tenable Network Security has extracted the preceding description block directly from the DLA security advisory. Tenable has attempted to automatically clean and format it as much as possible without introducing additional issues.
    last seen2020-03-17
    modified2015-10-29
    plugin id86641
    published2015-10-29
    reporterThis script is Copyright (C) 2015-2020 Tenable Network Security, Inc.
    sourcehttps://www.tenable.com/plugins/nessus/86641
    titleDebian DLA-336-1 : phpmyadmin security update
    code
    #%NASL_MIN_LEVEL 80502
    #
    # (C) Tenable Network Security, Inc.
    #
    # The descriptive text and package checks in this plugin were
    # extracted from Debian Security Advisory DLA-336-1. The text
    # itself is copyright (C) Software in the Public Interest, Inc.
    #
    
    include("compat.inc");
    
    if (description)
    {
      script_id(86641);
      script_version("2.6");
      script_set_attribute(attribute:"plugin_modification_date", value:"2020/03/12");
    
      script_cve_id("CVE-2014-8958", "CVE-2014-9218", "CVE-2015-2206", "CVE-2015-3902");
      script_bugtraq_id(71243, 71434, 72949, 74657);
    
      script_name(english:"Debian DLA-336-1 : phpmyadmin security update");
      script_summary(english:"Checks dpkg output for the updated package.");
    
      script_set_attribute(
        attribute:"synopsis", 
        value:"The remote Debian host is missing a security update."
      );
      script_set_attribute(
        attribute:"description", 
        value:
    "Several issues have been fixed in phpMyAdmin, the web administration
    tool for MySQL.
    
    CVE-2014-8958
    
    Multiple cross-site scripting (XSS) vulnerabilities.
    
    CVE-2014-9218
    
    Denial of service (resource consumption) via a long password.
    
    CVE-2015-2206
    
    Risk of BREACH attack due to reflected parameter.
    
    CVE-2015-3902
    
    XSRF/CSRF vulnerability in phpMyAdmin setup.
    
    NOTE: Tenable Network Security has extracted the preceding description
    block directly from the DLA security advisory. Tenable has attempted
    to automatically clean and format it as much as possible without
    introducing additional issues."
      );
      script_set_attribute(
        attribute:"see_also",
        value:"https://lists.debian.org/debian-lts-announce/2015/10/msg00014.html"
      );
      script_set_attribute(
        attribute:"see_also",
        value:"https://packages.debian.org/source/squeeze-lts/phpmyadmin"
      );
      script_set_attribute(
        attribute:"solution", 
        value:"Upgrade the affected phpmyadmin package."
      );
      script_set_cvss_base_vector("CVSS2#AV:N/AC:M/Au:N/C:P/I:P/A:P");
      script_set_cvss_temporal_vector("CVSS2#E:POC/RL:OF/RC:C");
      script_set_attribute(attribute:"exploitability_ease", value:"Exploits are available");
      script_set_attribute(attribute:"exploit_available", value:"true");
    
      script_set_attribute(attribute:"plugin_type", value:"local");
      script_set_attribute(attribute:"cpe", value:"p-cpe:/a:debian:debian_linux:phpmyadmin");
      script_set_attribute(attribute:"cpe", value:"cpe:/o:debian:debian_linux:6.0");
    
      script_set_attribute(attribute:"patch_publication_date", value:"2015/10/28");
      script_set_attribute(attribute:"plugin_publication_date", value:"2015/10/29");
      script_end_attributes();
    
      script_category(ACT_GATHER_INFO);
      script_copyright(english:"This script is Copyright (C) 2015-2020 Tenable Network Security, Inc.");
      script_family(english:"Debian Local Security Checks");
    
      script_dependencies("ssh_get_info.nasl");
      script_require_keys("Host/local_checks_enabled", "Host/Debian/release", "Host/Debian/dpkg-l");
    
      exit(0);
    }
    
    
    include("audit.inc");
    include("debian_package.inc");
    
    
    if (!get_kb_item("Host/local_checks_enabled")) audit(AUDIT_LOCAL_CHECKS_NOT_ENABLED);
    if (!get_kb_item("Host/Debian/release")) audit(AUDIT_OS_NOT, "Debian");
    if (!get_kb_item("Host/Debian/dpkg-l")) audit(AUDIT_PACKAGE_LIST_MISSING);
    
    
    flag = 0;
    if (deb_check(release:"6.0", prefix:"phpmyadmin", reference:"4:3.3.7-9")) flag++;
    
    if (flag)
    {
      if (report_verbosity > 0) security_warning(port:0, extra:deb_report_get());
      else security_warning(0);
      exit(0);
    }
    else audit(AUDIT_HOST_NOT, "affected");
    
  • NASL familySuSE Local Security Checks
    NASL idOPENSUSE-2014-776.NASL
    descriptionphpMyAdmin on openSUSE 12.3 and 13.1 was updated to 4.1.14.8. This update fixes one vulnerability. - Security fixes : - PMASA-2014-17 (CVE-2014-9218, CWE-661 CWE-400) [boo#908363] http://www.phpmyadmin.net/home_page/security/PMASA-2014- 17.php - sf#4611 [security] DOS attack with long passwords phpMyAdmin on openSUSE 13.2 was updated to 4.2.13.1 (2014-12-03) - Security fixes : - PMASA-2014-18 (CVE-2014-9219, CWE-661 CWE-79) [boo#908364] http://www.phpmyadmin.net/home_page/security/PMASA-2014- 18.php - sf#4612 [security] XSS vulnerability in redirection mechanism - PMASA-2014-17 (CVE-2014-9218, CWE-661 CWE-400) [boo#908363] http://www.phpmyadmin.net/home_page/security/PMASA-2014- 17.php - sf#4611 [security] DOS attack with long passwords - Bugfixes : - sf#4604 Query history not being deleted - sf#4057 db/table query string parameters no longer work - sf#4605 Unseen messages in tracking - sf#4606 Tracking report export as SQL dump does not work - sf#4607 Syntax error during db_copy operation - sf#4608 SELECT permission issues with relations and restricted access
    last seen2020-06-05
    modified2014-12-16
    plugin id80049
    published2014-12-16
    reporterThis script is Copyright (C) 2014-2020 and is owned by Tenable, Inc. or an Affiliate thereof.
    sourcehttps://www.tenable.com/plugins/nessus/80049
    titleopenSUSE Security Update : phpMyAdmin (openSUSE-SU-2014:1636-1)
    code
    #%NASL_MIN_LEVEL 80502
    #
    # (C) Tenable Network Security, Inc.
    #
    # The descriptive text and package checks in this plugin were
    # extracted from openSUSE Security Update openSUSE-2014-776.
    #
    # The text description of this plugin is (C) SUSE LLC.
    #
    
    include("compat.inc");
    
    if (description)
    {
      script_id(80049);
      script_version("1.4");
      script_set_attribute(attribute:"plugin_modification_date", value:"2020/06/04");
    
      script_cve_id("CVE-2014-9218", "CVE-2014-9219");
    
      script_name(english:"openSUSE Security Update : phpMyAdmin (openSUSE-SU-2014:1636-1)");
      script_summary(english:"Check for the openSUSE-2014-776 patch");
    
      script_set_attribute(
        attribute:"synopsis", 
        value:"The remote openSUSE host is missing a security update."
      );
      script_set_attribute(
        attribute:"description", 
        value:
    "phpMyAdmin on openSUSE 12.3 and 13.1 was updated to 4.1.14.8. This
    update fixes one vulnerability.
    
      - Security fixes :
    
      - PMASA-2014-17 (CVE-2014-9218, CWE-661 CWE-400)
        [boo#908363]
        http://www.phpmyadmin.net/home_page/security/PMASA-2014-
        17.php
    
      - sf#4611 [security] DOS attack with long passwords
    
    phpMyAdmin on openSUSE 13.2 was updated to 4.2.13.1 (2014-12-03)
    
      - Security fixes :
    
      - PMASA-2014-18 (CVE-2014-9219, CWE-661 CWE-79)
        [boo#908364]
        http://www.phpmyadmin.net/home_page/security/PMASA-2014-
        18.php
    
      - sf#4612 [security] XSS vulnerability in redirection
        mechanism
    
      - PMASA-2014-17 (CVE-2014-9218, CWE-661 CWE-400)
        [boo#908363]
        http://www.phpmyadmin.net/home_page/security/PMASA-2014-
        17.php
    
      - sf#4611 [security] DOS attack with long passwords
    
      - Bugfixes :
    
      - sf#4604 Query history not being deleted
    
      - sf#4057 db/table query string parameters no longer work
    
      - sf#4605 Unseen messages in tracking
    
      - sf#4606 Tracking report export as SQL dump does not work
    
      - sf#4607 Syntax error during db_copy operation
    
      - sf#4608 SELECT permission issues with relations and
        restricted access"
      );
      # http://www.phpmyadmin.net/home_page/security/PMASA-2014-17.php
      script_set_attribute(
        attribute:"see_also",
        value:"https://www.phpmyadmin.net/security/PMASA-2014-17/"
      );
      # http://www.phpmyadmin.net/home_page/security/PMASA-2014-18.php
      script_set_attribute(
        attribute:"see_also",
        value:"https://www.phpmyadmin.net/security/PMASA-2014-18/"
      );
      script_set_attribute(
        attribute:"see_also",
        value:"https://bugzilla.opensuse.org/show_bug.cgi?id=908363"
      );
      script_set_attribute(
        attribute:"see_also",
        value:"https://bugzilla.opensuse.org/show_bug.cgi?id=908364"
      );
      script_set_attribute(
        attribute:"see_also",
        value:"https://lists.opensuse.org/opensuse-updates/2014-12/msg00054.html"
      );
      script_set_attribute(
        attribute:"solution", 
        value:"Update the affected phpMyAdmin package."
      );
      script_set_cvss_base_vector("CVSS2#AV:N/AC:L/Au:N/C:N/I:N/A:P");
    
      script_set_attribute(attribute:"plugin_type", value:"local");
      script_set_attribute(attribute:"cpe", value:"p-cpe:/a:novell:opensuse:phpMyAdmin");
      script_set_attribute(attribute:"cpe", value:"cpe:/o:novell:opensuse:12.3");
      script_set_attribute(attribute:"cpe", value:"cpe:/o:novell:opensuse:13.1");
      script_set_attribute(attribute:"cpe", value:"cpe:/o:novell:opensuse:13.2");
    
      script_set_attribute(attribute:"patch_publication_date", value:"2014/12/06");
      script_set_attribute(attribute:"plugin_publication_date", value:"2014/12/16");
      script_end_attributes();
    
      script_category(ACT_GATHER_INFO);
      script_copyright(english:"This script is Copyright (C) 2014-2020 and is owned by Tenable, Inc. or an Affiliate thereof.");
      script_family(english:"SuSE Local Security Checks");
    
      script_dependencies("ssh_get_info.nasl");
      script_require_keys("Host/local_checks_enabled", "Host/SuSE/release", "Host/SuSE/rpm-list");
    
      exit(0);
    }
    
    
    include("audit.inc");
    include("global_settings.inc");
    include("rpm.inc");
    
    if (!get_kb_item("Host/local_checks_enabled")) audit(AUDIT_LOCAL_CHECKS_NOT_ENABLED);
    release = get_kb_item("Host/SuSE/release");
    if (isnull(release) || release =~ "^(SLED|SLES)") audit(AUDIT_OS_NOT, "openSUSE");
    if (release !~ "^(SUSE12\.3|SUSE13\.1|SUSE13\.2)$") audit(AUDIT_OS_RELEASE_NOT, "openSUSE", "12.3 / 13.1 / 13.2", release);
    if (!get_kb_item("Host/SuSE/rpm-list")) audit(AUDIT_PACKAGE_LIST_MISSING);
    
    
    
    flag = 0;
    
    if ( rpm_check(release:"SUSE12.3", reference:"phpMyAdmin-4.1.14.8-1.38.1") ) flag++;
    if ( rpm_check(release:"SUSE13.1", reference:"phpMyAdmin-4.1.14.8-28.1") ) flag++;
    if ( rpm_check(release:"SUSE13.2", reference:"phpMyAdmin-4.2.13.1-8.1") ) flag++;
    
    if (flag)
    {
      if (report_verbosity > 0) security_warning(port:0, extra:rpm_report_get());
      else security_warning(0);
      exit(0);
    }
    else
    {
      tested = pkg_tests_get();
      if (tested) audit(AUDIT_PACKAGE_NOT_AFFECTED, tested);
      else audit(AUDIT_PACKAGE_NOT_INSTALLED, "phpMyAdmin");
    }
    
  • NASL familyDebian Local Security Checks
    NASL idDEBIAN_DSA-3382.NASL
    descriptionSeveral issues have been fixed in phpMyAdmin, the web administration tool for MySQL. - CVE-2014-8958 (Wheezy only) Multiple cross-site scripting (XSS) vulnerabilities. - CVE-2014-9218 (Wheezy only) Denial of service (resource consumption) via a long password. - CVE-2015-2206 Risk of BREACH attack due to reflected parameter. - CVE-2015-3902 XSRF/CSRF vulnerability in phpMyAdmin setup. - CVE-2015-3903 (Jessie only) Vulnerability allowing man-in-the-middle attack on API call to GitHub. - CVE-2015-6830 (Jessie only) Vulnerability that allows bypassing the reCaptcha test. - CVE-2015-7873 (Jessie only) Content spoofing vulnerability when redirecting user to an external site.
    last seen2020-06-01
    modified2020-06-02
    plugin id86665
    published2015-10-30
    reporterThis script is Copyright (C) 2015-2018 and is owned by Tenable, Inc. or an Affiliate thereof.
    sourcehttps://www.tenable.com/plugins/nessus/86665
    titleDebian DSA-3382-1 : phpmyadmin - security update
    code
    #
    # (C) Tenable Network Security, Inc.
    #
    # The descriptive text and package checks in this plugin were  
    # extracted from Debian Security Advisory DSA-3382. The text 
    # itself is copyright (C) Software in the Public Interest, Inc.
    #
    
    include("compat.inc");
    
    if (description)
    {
      script_id(86665);
      script_version("2.4");
      script_cvs_date("Date: 2018/11/10 11:49:37");
    
      script_cve_id("CVE-2014-8958", "CVE-2014-9218", "CVE-2015-2206", "CVE-2015-3902", "CVE-2015-3903", "CVE-2015-6830", "CVE-2015-7873");
      script_xref(name:"DSA", value:"3382");
    
      script_name(english:"Debian DSA-3382-1 : phpmyadmin - security update");
      script_summary(english:"Checks dpkg output for the updated package");
    
      script_set_attribute(
        attribute:"synopsis", 
        value:"The remote Debian host is missing a security-related update."
      );
      script_set_attribute(
        attribute:"description", 
        value:
    "Several issues have been fixed in phpMyAdmin, the web administration
    tool for MySQL.
    
      - CVE-2014-8958 (Wheezy only)
        Multiple cross-site scripting (XSS) vulnerabilities.
    
      - CVE-2014-9218 (Wheezy only)
        Denial of service (resource consumption) via a long
        password.
    
      - CVE-2015-2206
        Risk of BREACH attack due to reflected parameter.
    
      - CVE-2015-3902
        XSRF/CSRF vulnerability in phpMyAdmin setup.
    
      - CVE-2015-3903 (Jessie only)
        Vulnerability allowing man-in-the-middle attack on API
        call to GitHub.
    
      - CVE-2015-6830 (Jessie only)
        Vulnerability that allows bypassing the reCaptcha test.
    
      - CVE-2015-7873 (Jessie only)
        Content spoofing vulnerability when redirecting user to
        an external site."
      );
      script_set_attribute(
        attribute:"see_also",
        value:"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=774194"
      );
      script_set_attribute(
        attribute:"see_also",
        value:"https://security-tracker.debian.org/tracker/CVE-2014-8958"
      );
      script_set_attribute(
        attribute:"see_also",
        value:"https://security-tracker.debian.org/tracker/CVE-2014-9218"
      );
      script_set_attribute(
        attribute:"see_also",
        value:"https://security-tracker.debian.org/tracker/CVE-2015-2206"
      );
      script_set_attribute(
        attribute:"see_also",
        value:"https://security-tracker.debian.org/tracker/CVE-2015-3902"
      );
      script_set_attribute(
        attribute:"see_also",
        value:"https://security-tracker.debian.org/tracker/CVE-2015-3903"
      );
      script_set_attribute(
        attribute:"see_also",
        value:"https://security-tracker.debian.org/tracker/CVE-2015-6830"
      );
      script_set_attribute(
        attribute:"see_also",
        value:"https://security-tracker.debian.org/tracker/CVE-2015-7873"
      );
      script_set_attribute(
        attribute:"see_also",
        value:"https://packages.debian.org/source/wheezy/phpmyadmin"
      );
      script_set_attribute(
        attribute:"see_also",
        value:"https://packages.debian.org/source/jessie/phpmyadmin"
      );
      script_set_attribute(
        attribute:"see_also",
        value:"https://www.debian.org/security/2015/dsa-3382"
      );
      script_set_attribute(
        attribute:"solution", 
        value:
    "Upgrade the phpmyadmin packages.
    
    For the oldstable distribution (wheezy), these problems have been
    fixed in version 4:3.4.11.1-2+deb7u2.
    
    For the stable distribution (jessie), these problems have been fixed
    in version 4:4.2.12-2+deb8u1."
      );
      script_set_cvss_base_vector("CVSS2#AV:N/AC:M/Au:N/C:P/I:P/A:P");
      script_set_cvss_temporal_vector("CVSS2#E:POC/RL:OF/RC:C");
      script_set_attribute(attribute:"exploitability_ease", value:"Exploits are available");
      script_set_attribute(attribute:"exploit_available", value:"true");
    
      script_set_attribute(attribute:"plugin_type", value:"local");
      script_set_attribute(attribute:"cpe", value:"p-cpe:/a:debian:debian_linux:phpmyadmin");
      script_set_attribute(attribute:"cpe", value:"cpe:/o:debian:debian_linux:7.0");
      script_set_attribute(attribute:"cpe", value:"cpe:/o:debian:debian_linux:8.0");
    
      script_set_attribute(attribute:"patch_publication_date", value:"2015/10/28");
      script_set_attribute(attribute:"plugin_publication_date", value:"2015/10/30");
      script_end_attributes();
    
      script_category(ACT_GATHER_INFO);
      script_copyright(english:"This script is Copyright (C) 2015-2018 and is owned by Tenable, Inc. or an Affiliate thereof.");
      script_family(english:"Debian Local Security Checks");
    
      script_dependencies("ssh_get_info.nasl");
      script_require_keys("Host/local_checks_enabled", "Host/Debian/release", "Host/Debian/dpkg-l");
    
      exit(0);
    }
    
    
    include("audit.inc");
    include("debian_package.inc");
    
    
    if (!get_kb_item("Host/local_checks_enabled")) audit(AUDIT_LOCAL_CHECKS_NOT_ENABLED);
    if (!get_kb_item("Host/Debian/release")) audit(AUDIT_OS_NOT, "Debian");
    if (!get_kb_item("Host/Debian/dpkg-l")) audit(AUDIT_PACKAGE_LIST_MISSING);
    
    
    flag = 0;
    if (deb_check(release:"7.0", prefix:"phpmyadmin", reference:"4:3.4.11.1-2+deb7u2")) flag++;
    if (deb_check(release:"8.0", prefix:"phpmyadmin", reference:"4:4.2.12-2+deb8u1")) flag++;
    
    if (flag)
    {
      if (report_verbosity > 0) security_warning(port:0, extra:deb_report_get());
      else security_warning(0);
      exit(0);
    }
    else audit(AUDIT_HOST_NOT, "affected");
    
  • NASL familyFedora Local Security Checks
    NASL idFEDORA_2014-16474.NASL
    descriptionphpMyAdmin 4.2.13.1 (2014-12-03) ================================ - [security] XSS vulnerability in redirection mechanism - [security] DOS attack with long passwords Note that Tenable Network Security has extracted the preceding description block directly from the Fedora security advisory. Tenable has attempted to automatically clean and format it as much as possible without introducing additional issues.
    last seen2020-03-17
    modified2014-12-15
    plugin id79948
    published2014-12-15
    reporterThis script is Copyright (C) 2014-2020 Tenable Network Security, Inc.
    sourcehttps://www.tenable.com/plugins/nessus/79948
    titleFedora 19 : phpMyAdmin-4.2.13.1-1.fc19 (2014-16474)
  • NASL familyFreeBSD Local Security Checks
    NASL idFREEBSD_PKG_C9C46FBF7B8311E4A96E6805CA0B3D42.NASL
    descriptionThe phpMyAdmin development team reports : DoS vulnerability with long passwords. With very long passwords it was possible to initiate a denial of service attack on phpMyAdmin. We consider this vulnerability to be serious. This vulnerability can be mitigated by configuring throttling in the webserver. XSS vulnerability in redirection mechanism. With a crafted URL it was possible to trigger an XSS in the redirection mechanism in phpMyAdmin. We consider this vulnerability to be non critical.
    last seen2020-06-01
    modified2020-06-02
    plugin id79734
    published2014-12-05
    reporterThis script is Copyright (C) 2014-2018 and is owned by Tenable, Inc. or an Affiliate thereof.
    sourcehttps://www.tenable.com/plugins/nessus/79734
    titleFreeBSD : phpMyAdmin -- XSS and DoS vulnerabilities (c9c46fbf-7b83-11e4-a96e-6805ca0b3d42)
  • NASL familyCGI abuses
    NASL idPHPMYADMIN_PMASA_2014_18.NASL
    descriptionAccording to its self-reported version number, the phpMyAdmin application hosted on the remote web server is 4.0.x prior to 4.0.10.7, 4.1.x prior to 4.1.14.8, or 4.2.x prior to 4.2.13.1. It is, therefore, affected by the following vulnerabilities : - A flaw exists in handling overly long passwords. It is possible that a remote attacker can cause a denial of service by using a long password. (CVE-2014-9218) - A cross-site scripting flaw exists due to the improper validation of URLs when handling redirection. A remote attacker, by using a specially crafted request, could execute arbitrary script code within the trust relationship of the browser and server. Note that this applies only to versions 4.2.x prior to 4.2.13.1. (CVE-2014-9219) Note that Nessus has not tested for these issues but has instead relied only on the application
    last seen2020-06-01
    modified2020-06-02
    plugin id79797
    published2014-12-08
    reporterThis script is Copyright (C) 2014-2019 and is owned by Tenable, Inc. or an Affiliate thereof.
    sourcehttps://www.tenable.com/plugins/nessus/79797
    titlephpMyAdmin 4.0.x < 4.0.10.7 / 4.1.x < 4.1.14.8 / 4.2.x < 4.2.13.1 Multiple Vulnerabilities (PMASA-2014-17 - PMASA-2014-18)
  • NASL familyMandriva Local Security Checks
    NASL idMANDRIVA_MDVSA-2014-243.NASL
    descriptionMultiple vulnerabilities has been discovered and corrected in phpmyadmin : libraries/common.inc.php in phpMyAdmin 4.0.x before 4.0.10.7, 4.1.x before 4.1.14.8, and 4.2.x before 4.2.13.1 allows remote attackers to cause a denial of service (resource consumption) via a long password (CVE-2014-9218). Cross-site scripting (XSS) vulnerability in the redirection feature in url.php in phpMyAdmin 4.2.x before 4.2.13.1 allows remote attackers to inject arbitrary web script or HTML via the url parameter (CVE-2014-9219). This upgrade provides the latest phpmyadmin version (4.2.13.1) to address these vulnerabilities.
    last seen2020-06-01
    modified2020-06-02
    plugin id79988
    published2014-12-15
    reporterThis script is Copyright (C) 2014-2019 Tenable Network Security, Inc.
    sourcehttps://www.tenable.com/plugins/nessus/79988
    titleMandriva Linux Security Advisory : phpmyadmin (MDVSA-2014:243)
  • NASL familyFedora Local Security Checks
    NASL idFEDORA_2014-16327.NASL
    descriptionphpMyAdmin 4.2.13.1 (2014-12-03) ================================ - [security] XSS vulnerability in redirection mechanism - [security] DOS attack with long passwords Note that Tenable Network Security has extracted the preceding description block directly from the Fedora security advisory. Tenable has attempted to automatically clean and format it as much as possible without introducing additional issues.
    last seen2020-03-17
    modified2014-12-15
    plugin id79933
    published2014-12-15
    reporterThis script is Copyright (C) 2014-2020 Tenable Network Security, Inc.
    sourcehttps://www.tenable.com/plugins/nessus/79933
    titleFedora 21 : phpMyAdmin-4.2.13.1-1.fc21 (2014-16327)