Vulnerabilities > CVE-2016-6621 - Server-Side Request Forgery (SSRF) vulnerability in PHPmyadmin
Attack vector
NETWORK Attack complexity
LOW Privileges required
NONE Confidentiality impact
HIGH Integrity impact
NONE Availability impact
NONE Summary
The setup script for phpMyAdmin before 4.0.10.19, 4.4.x before 4.4.15.10, and 4.6.x before 4.6.6 allows remote attackers to conduct server-side request forgery (SSRF) attacks via unspecified vectors.
Vulnerable Configurations
Common Weakness Enumeration (CWE)
Nessus
NASL family SuSE Local Security Checks NASL id OPENSUSE-2017-198.NASL description This update to phpMyAdmin 4.4.15.10 fixes the following security issues : - CVE-2016-6621: Multiple vulnerabilities in setup script (PMASA-2016-44) - Open redirect (PMASA-2017-1) - CVE-2015-8980: php-gettext code execution (PMASA-2017-2) - DOS vulnerability in table editing (PMASA-2017-3) - CSS injection in themes (PMASA-2017-4) - SSRF in replication (PMASA-2017-6) - DOS in replication status (PMASA-2017-7) last seen 2020-06-05 modified 2017-02-06 plugin id 97001 published 2017-02-06 reporter This script is Copyright (C) 2017-2020 and is owned by Tenable, Inc. or an Affiliate thereof. source https://www.tenable.com/plugins/nessus/97001 title openSUSE Security Update : phpMyAdmin (openSUSE-2017-198) code #%NASL_MIN_LEVEL 80502 # # (C) Tenable Network Security, Inc. # # The descriptive text and package checks in this plugin were # extracted from openSUSE Security Update openSUSE-2017-198. # # The text description of this plugin is (C) SUSE LLC. # include("compat.inc"); if (description) { script_id(97001); script_version("3.5"); script_set_attribute(attribute:"plugin_modification_date", value:"2020/06/04"); script_cve_id("CVE-2015-8980", "CVE-2016-6621"); script_name(english:"openSUSE Security Update : phpMyAdmin (openSUSE-2017-198)"); script_summary(english:"Check for the openSUSE-2017-198 patch"); script_set_attribute( attribute:"synopsis", value:"The remote openSUSE host is missing a security update." ); script_set_attribute( attribute:"description", value: "This update to phpMyAdmin 4.4.15.10 fixes the following security issues : - CVE-2016-6621: Multiple vulnerabilities in setup script (PMASA-2016-44) - Open redirect (PMASA-2017-1) - CVE-2015-8980: php-gettext code execution (PMASA-2017-2) - DOS vulnerability in table editing (PMASA-2017-3) - CSS injection in themes (PMASA-2017-4) - SSRF in replication (PMASA-2017-6) - DOS in replication status (PMASA-2017-7)" ); script_set_attribute( attribute:"see_also", value:"https://bugzilla.opensuse.org/show_bug.cgi?id=1021597" ); script_set_attribute( attribute:"solution", value:"Update the affected phpMyAdmin package." ); script_set_cvss_base_vector("CVSS2#AV:N/AC:L/Au:N/C:P/I:P/A:P"); script_set_cvss3_base_vector("CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"); script_set_attribute(attribute:"plugin_type", value:"local"); script_set_attribute(attribute:"cpe", value:"p-cpe:/a:novell:opensuse:phpMyAdmin"); script_set_attribute(attribute:"cpe", value:"cpe:/o:novell:opensuse:42.1"); script_set_attribute(attribute:"cpe", value:"cpe:/o:novell:opensuse:42.2"); script_set_attribute(attribute:"vuln_publication_date", value:"2017/01/31"); script_set_attribute(attribute:"patch_publication_date", value:"2017/02/02"); script_set_attribute(attribute:"plugin_publication_date", value:"2017/02/06"); script_set_attribute(attribute:"generated_plugin", value:"current"); script_end_attributes(); script_category(ACT_GATHER_INFO); script_copyright(english:"This script is Copyright (C) 2017-2020 and is owned by Tenable, Inc. or an Affiliate thereof."); script_family(english:"SuSE Local Security Checks"); script_dependencies("ssh_get_info.nasl"); script_require_keys("Host/local_checks_enabled", "Host/SuSE/release", "Host/SuSE/rpm-list"); exit(0); } include("audit.inc"); include("global_settings.inc"); include("rpm.inc"); if (!get_kb_item("Host/local_checks_enabled")) audit(AUDIT_LOCAL_CHECKS_NOT_ENABLED); release = get_kb_item("Host/SuSE/release"); if (isnull(release) || release =~ "^(SLED|SLES)") audit(AUDIT_OS_NOT, "openSUSE"); if (release !~ "^(SUSE42\.1|SUSE42\.2)$") audit(AUDIT_OS_RELEASE_NOT, "openSUSE", "42.1 / 42.2", release); if (!get_kb_item("Host/SuSE/rpm-list")) audit(AUDIT_PACKAGE_LIST_MISSING); flag = 0; if ( rpm_check(release:"SUSE42.1", reference:"phpMyAdmin-4.4.15.10-31.2") ) flag++; if ( rpm_check(release:"SUSE42.2", reference:"phpMyAdmin-4.4.15.10-31.2") ) flag++; if (flag) { if (report_verbosity > 0) security_hole(port:0, extra:rpm_report_get()); else security_hole(0); exit(0); } else { tested = pkg_tests_get(); if (tested) audit(AUDIT_PACKAGE_NOT_AFFECTED, tested); else audit(AUDIT_PACKAGE_NOT_INSTALLED, "phpMyAdmin"); }
NASL family Debian Local Security Checks NASL id DEBIAN_DLA-1415.NASL description Several vulnerabilities were found in phpMyAdmin, the web-based MySQL administration interface, including SQL injection attacks, denial of service, arbitrary code execution, cross-site scripting, server-side request forgery, authentication bypass, and file system traversal. For Debian 8 last seen 2020-06-01 modified 2020-06-02 plugin id 110945 published 2018-07-09 reporter This script is Copyright (C) 2018 and is owned by Tenable, Inc. or an Affiliate thereof. source https://www.tenable.com/plugins/nessus/110945 title Debian DLA-1415-1 : phpmyadmin security update code # # (C) Tenable Network Security, Inc. # # The descriptive text and package checks in this plugin were # extracted from Debian Security Advisory DLA-1415-1. The text # itself is copyright (C) Software in the Public Interest, Inc. # include("compat.inc"); if (description) { script_id(110945); script_version("1.3"); script_cvs_date("Date: 2018/08/08 12:52:14"); script_cve_id("CVE-2016-6609", "CVE-2016-6614", "CVE-2016-6615", "CVE-2016-6616", "CVE-2016-6618", "CVE-2016-6619", "CVE-2016-6620", "CVE-2016-6621", "CVE-2016-6622", "CVE-2016-9865", "CVE-2017-18264"); script_name(english:"Debian DLA-1415-1 : phpmyadmin security update"); script_summary(english:"Checks dpkg output for the updated package."); script_set_attribute( attribute:"synopsis", value:"The remote Debian host is missing a security update." ); script_set_attribute( attribute:"description", value: "Several vulnerabilities were found in phpMyAdmin, the web-based MySQL administration interface, including SQL injection attacks, denial of service, arbitrary code execution, cross-site scripting, server-side request forgery, authentication bypass, and file system traversal. For Debian 8 'Jessie', these problems have been fixed in version 4:4.2.12-2+deb8u3. We recommend that you upgrade your phpmyadmin packages. NOTE: Tenable Network Security has extracted the preceding description block directly from the DLA security advisory. Tenable has attempted to automatically clean and format it as much as possible without introducing additional issues." ); script_set_attribute( attribute:"see_also", value:"https://lists.debian.org/debian-lts-announce/2018/07/msg00006.html" ); script_set_attribute( attribute:"see_also", value:"https://packages.debian.org/source/jessie/phpmyadmin" ); script_set_attribute( attribute:"solution", value:"Upgrade the affected phpmyadmin package." ); script_set_cvss_base_vector("CVSS2#AV:N/AC:L/Au:N/C:P/I:P/A:P"); script_set_cvss_temporal_vector("CVSS2#E:U/RL:OF/RC:C"); script_set_cvss3_base_vector("CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"); script_set_cvss3_temporal_vector("CVSS:3.0/E:U/RL:O/RC:C"); script_set_attribute(attribute:"plugin_type", value:"local"); script_set_attribute(attribute:"cpe", value:"p-cpe:/a:debian:debian_linux:phpmyadmin"); script_set_attribute(attribute:"cpe", value:"cpe:/o:debian:debian_linux:8.0"); script_set_attribute(attribute:"patch_publication_date", value:"2018/07/06"); script_set_attribute(attribute:"plugin_publication_date", value:"2018/07/09"); script_end_attributes(); script_category(ACT_GATHER_INFO); script_copyright(english:"This script is Copyright (C) 2018 and is owned by Tenable, Inc. or an Affiliate thereof."); script_family(english:"Debian Local Security Checks"); script_dependencies("ssh_get_info.nasl"); script_require_keys("Host/local_checks_enabled", "Host/Debian/release", "Host/Debian/dpkg-l"); exit(0); } include("audit.inc"); include("debian_package.inc"); if (!get_kb_item("Host/local_checks_enabled")) audit(AUDIT_LOCAL_CHECKS_NOT_ENABLED); if (!get_kb_item("Host/Debian/release")) audit(AUDIT_OS_NOT, "Debian"); if (!get_kb_item("Host/Debian/dpkg-l")) audit(AUDIT_PACKAGE_LIST_MISSING); flag = 0; if (deb_check(release:"8.0", prefix:"phpmyadmin", reference:"4:4.2.12-2+deb8u3")) flag++; if (flag) { if (report_verbosity > 0) security_hole(port:0, extra:deb_report_get()); else security_hole(0); exit(0); } else audit(AUDIT_HOST_NOT, "affected");
NASL family Debian Local Security Checks NASL id DEBIAN_DLA-834.NASL description A server-side request forgery vulnerability was reported for the setup script in phpmyadmin, a MYSQL web administration tool. This flaw may allow an unauthenticated attacker to brute-force MYSQL passwords, detect internal hostnames or opened ports on the internal network. Additionally there was a race condition between writing configuration and administrator moving it allowing unauthenticated users to read or alter it. Debian users who configured phpmyadmin via debconf and used the default configuration for Apache 2 or Lighttpd were never affected. For Debian 7 last seen 2020-03-17 modified 2017-02-27 plugin id 97392 published 2017-02-27 reporter This script is Copyright (C) 2017-2020 and is owned by Tenable, Inc. or an Affiliate thereof. source https://www.tenable.com/plugins/nessus/97392 title Debian DLA-834-1 : phpmyadmin security update code #%NASL_MIN_LEVEL 80502 # # (C) Tenable Network Security, Inc. # # The descriptive text and package checks in this plugin were # extracted from Debian Security Advisory DLA-834-1. The text # itself is copyright (C) Software in the Public Interest, Inc. # include("compat.inc"); if (description) { script_id(97392); script_version("3.5"); script_set_attribute(attribute:"plugin_modification_date", value:"2020/03/12"); script_cve_id("CVE-2016-6621"); script_name(english:"Debian DLA-834-1 : phpmyadmin security update"); script_summary(english:"Checks dpkg output for the updated package."); script_set_attribute( attribute:"synopsis", value:"The remote Debian host is missing a security update." ); script_set_attribute( attribute:"description", value: "A server-side request forgery vulnerability was reported for the setup script in phpmyadmin, a MYSQL web administration tool. This flaw may allow an unauthenticated attacker to brute-force MYSQL passwords, detect internal hostnames or opened ports on the internal network. Additionally there was a race condition between writing configuration and administrator moving it allowing unauthenticated users to read or alter it. Debian users who configured phpmyadmin via debconf and used the default configuration for Apache 2 or Lighttpd were never affected. For Debian 7 'Wheezy', these problems have been fixed in version 4:3.4.11.1-2+deb7u8. We recommend that you upgrade your phpmyadmin packages. NOTE: Tenable Network Security has extracted the preceding description block directly from the DLA security advisory. Tenable has attempted to automatically clean and format it as much as possible without introducing additional issues." ); script_set_attribute( attribute:"see_also", value:"https://lists.debian.org/debian-lts-announce/2017/02/msg00024.html" ); script_set_attribute( attribute:"see_also", value:"https://packages.debian.org/source/wheezy/phpmyadmin" ); script_set_attribute( attribute:"solution", value:"Upgrade the affected phpmyadmin package." ); script_set_cvss_base_vector("CVSS2#AV:N/AC:L/Au:N/C:P/I:N/A:N"); script_set_cvss_temporal_vector("CVSS2#E:U/RL:OF/RC:C"); script_set_cvss3_base_vector("CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:N/A:N"); script_set_cvss3_temporal_vector("CVSS:3.0/E:U/RL:O/RC:C"); script_set_attribute(attribute:"exploitability_ease", value:"No known exploits are available"); script_set_attribute(attribute:"exploit_available", value:"false"); script_set_attribute(attribute:"plugin_type", value:"local"); script_set_attribute(attribute:"cpe", value:"p-cpe:/a:debian:debian_linux:phpmyadmin"); script_set_attribute(attribute:"cpe", value:"cpe:/o:debian:debian_linux:7.0"); script_set_attribute(attribute:"patch_publication_date", value:"2017/02/24"); script_set_attribute(attribute:"plugin_publication_date", value:"2017/02/27"); script_end_attributes(); script_category(ACT_GATHER_INFO); script_copyright(english:"This script is Copyright (C) 2017-2020 and is owned by Tenable, Inc. or an Affiliate thereof."); script_family(english:"Debian Local Security Checks"); script_dependencies("ssh_get_info.nasl"); script_require_keys("Host/local_checks_enabled", "Host/Debian/release", "Host/Debian/dpkg-l"); exit(0); } include("audit.inc"); include("debian_package.inc"); if (!get_kb_item("Host/local_checks_enabled")) audit(AUDIT_LOCAL_CHECKS_NOT_ENABLED); if (!get_kb_item("Host/Debian/release")) audit(AUDIT_OS_NOT, "Debian"); if (!get_kb_item("Host/Debian/dpkg-l")) audit(AUDIT_PACKAGE_LIST_MISSING); flag = 0; if (deb_check(release:"7.0", prefix:"phpmyadmin", reference:"4:3.4.11.1-2+deb7u8")) flag++; if (flag) { if (report_verbosity > 0) security_warning(port:0, extra:deb_report_get()); else security_warning(0); exit(0); } else audit(AUDIT_HOST_NOT, "affected");
NASL family SuSE Local Security Checks NASL id OPENSUSE-2016-1021.NASL description phpMyAdmin was updated to version 4.4.15.8 (2016-08-16) to fix the following issues : - Upstream changelog for 4.4.15.8 : - Improve session cookie code for openid.php and signon.php example files - Full path disclosure in openid.php and signon.php example files - Unsafe generation of BlowfishSecret (when not supplied by the user) - Referrer leak when phpinfo is enabled - Use HTTPS for wiki links - Improve SSL certificate handling - Fix full path disclosure in debugging code - Administrators could trigger SQL injection attack against users - other fixes - Remove Swekey support - Security fixes: https://www.phpmyadmin.net/security/ - Weaknesses with cookie encryption see PMASA-2016-29 (CVE-2016-6606, CWE-661) - Multiple XSS vulnerabilities see PMASA-2016-30 (CVE-2016-6607, CWE-661) - Multiple XSS vulnerabilities see PMASA-2016-31 (CVE-2016-6608, CWE-661) - PHP code injection see PMASA-2016-32 (CVE-2016-6609, CWE-661) - Full path disclosure see PMASA-2016-33 (CVE-2016-6610, CWE-661) - SQL injection attack see PMASA-2016-34 (CVE-2016-6611, CWE-661) - Local file exposure through LOAD DATA LOCAL INFILE see PMASA-2016-35 (CVE-2016-6612, CWE-661) - Local file exposure through symlinks with UploadDir see PMASA-2016-36 (CVE-2016-6613, CWE-661) - Path traversal with SaveDir and UploadDir see PMASA-2016-37 (CVE-2016-6614, CWE-661) - Multiple XSS vulnerabilities see PMASA-2016-38 (CVE-2016-6615, CWE-661) - SQL injection vulnerability as control user see PMASA-2016-39 (CVE-2016-6616, CWE-661) - SQL injection vulnerability see PMASA-2016-40 (CVE-2016-6617, CWE-661) - Denial-of-service attack through transformation feature see PMASA-2016-41 (CVE-2016-6618, CWE-661) - SQL injection vulnerability as control user see PMASA-2016-42 (CVE-2016-6619, CWE-661) - Verify data before unserializing see PMASA-2016-43 (CVE-2016-6620, CWE-661) - SSRF in setup script see PMASA-2016-44 (CVE-2016-6621, CWE-661) - Denial-of-service attack with $cfg[ last seen 2020-06-05 modified 2016-08-30 plugin id 93212 published 2016-08-30 reporter This script is Copyright (C) 2016-2020 Tenable Network Security, Inc. source https://www.tenable.com/plugins/nessus/93212 title openSUSE Security Update : phpMyAdmin (openSUSE-2016-1021) NASL family SuSE Local Security Checks NASL id OPENSUSE-2016-1027.NASL description This phpMyAdmin update to version 4.4.15.8 fixes the following issues : Security issues fixed : - Improve session cookie code for openid.php and signon.php example files - Full path disclosure in openid.php and signon.php example files - Unsafe generation of BlowfishSecret (when not supplied by the user) - Referrer leak when phpinfo is enabled - Use HTTPS for wiki links - Improve SSL certificate handling - Fix full path disclosure in debugging code - Administrators could trigger SQL injection attack against users - Weaknesses with cookie encryption see PMASA-2016-29 (CVE-2016-6606, CWE-661) - Multiple XSS vulnerabilities see PMASA-2016-30 (CVE-2016-6607, CWE-661) - Multiple XSS vulnerabilities see PMASA-2016-31 (CVE-2016-6608, CWE-661) - PHP code injection see PMASA-2016-32 (CVE-2016-6609, CWE-661) - Full path disclosure see PMASA-2016-33 (CVE-2016-6610, CWE-661) - SQL injection attack see PMASA-2016-34 (CVE-2016-6611, CWE-661) - Local file exposure through LOAD DATA LOCAL INFILE see PMASA-2016-35 (CVE-2016-6612, CWE-661) - Local file exposure through symlinks with UploadDir see PMASA-2016-36 (CVE-2016-6613, CWE-661) - Path traversal with SaveDir and UploadDir see PMASA-2016-37 (CVE-2016-6614, CWE-661) - Multiple XSS vulnerabilities see PMASA-2016-38 (CVE-2016-6615, CWE-661) - SQL injection vulnerability as control user see PMASA-2016-39 (CVE-2016-6616, CWE-661) - SQL injection vulnerability see PMASA-2016-40 (CVE-2016-6617, CWE-661) - Denial-of-service attack through transformation feature see PMASA-2016-41 (CVE-2016-6618, CWE-661) - SQL injection vulnerability as control user see PMASA-2016-42 (CVE-2016-6619, CWE-661) - Verify data before unserializing see PMASA-2016-43 (CVE-2016-6620, CWE-661) - SSRF in setup script see PMASA-2016-44 (CVE-2016-6621, CWE-661) - Denial-of-service attack with $cfg[ last seen 2020-06-05 modified 2016-08-30 plugin id 93214 published 2016-08-30 reporter This script is Copyright (C) 2016-2020 Tenable Network Security, Inc. source https://www.tenable.com/plugins/nessus/93214 title openSUSE Security Update : phpMyAdmin (openSUSE-2016-1027)
References
- http://www.securityfocus.com/bid/95914
- http://www.securityfocus.com/bid/95914
- https://lists.debian.org/debian-lts-announce/2018/07/msg00006.html
- https://lists.debian.org/debian-lts-announce/2018/07/msg00006.html
- https://www.phpmyadmin.net/security/PMASA-2016-44/
- https://www.phpmyadmin.net/security/PMASA-2016-44/