CVE-2009-1151

Static code injection vulnerability in setup.php in phpMyAdmin 2.11.x before 2.11.9.5 and 3.x before 3.1.3.1 allows remote attackers to inject arbitrary PHP code into a configuration file via the save action.
References
Link Resource
http://labs.neohapsis.com/2009/04/06/about-cve-2009-1151/ Broken Link
http://lists.opensuse.org/opensuse-security-announce/2009-04/msg00003.html Product
http://phpmyadmin.svn.sourceforge.net/viewvc/phpmyadmin/branches/MAINT_2_11_9/phpMyAdmin/scripts/setup.php?r1=11514&r2=12301&pathrev=12301 Vendor Advisory
http://secunia.com/advisories/34430 Broken Link Vendor Advisory
http://secunia.com/advisories/34642 Broken Link Vendor Advisory
http://secunia.com/advisories/35585 Broken Link Vendor Advisory
http://secunia.com/advisories/35635 Broken Link Vendor Advisory
http://security.gentoo.org/glsa/glsa-200906-03.xml Third Party Advisory
http://www.debian.org/security/2009/dsa-1824 Mailing List
http://www.gnucitizen.org/blog/cve-2009-1151-phpmyadmin-remote-code-execution-proof-of-concept/ Exploit Issue Tracking
http://www.mandriva.com/security/advisories?name=MDVSA-2009:115 Broken Link
http://www.phpmyadmin.net/home_page/security/PMASA-2009-3.php Patch Vendor Advisory
http://www.securityfocus.com/archive/1/504191/100/0/threaded Broken Link Third Party Advisory VDB Entry
http://www.securityfocus.com/bid/34236 Broken Link Third Party Advisory VDB Entry
https://www.exploit-db.com/exploits/8921 Exploit Third Party Advisory VDB Entry
http://labs.neohapsis.com/2009/04/06/about-cve-2009-1151/ Broken Link
http://lists.opensuse.org/opensuse-security-announce/2009-04/msg00003.html Product
http://phpmyadmin.svn.sourceforge.net/viewvc/phpmyadmin/branches/MAINT_2_11_9/phpMyAdmin/scripts/setup.php?r1=11514&r2=12301&pathrev=12301 Vendor Advisory
http://secunia.com/advisories/34430 Broken Link Vendor Advisory
http://secunia.com/advisories/34642 Broken Link Vendor Advisory
http://secunia.com/advisories/35585 Broken Link Vendor Advisory
http://secunia.com/advisories/35635 Broken Link Vendor Advisory
http://security.gentoo.org/glsa/glsa-200906-03.xml Third Party Advisory
http://www.debian.org/security/2009/dsa-1824 Mailing List
http://www.gnucitizen.org/blog/cve-2009-1151-phpmyadmin-remote-code-execution-proof-of-concept/ Exploit Issue Tracking
http://www.mandriva.com/security/advisories?name=MDVSA-2009:115 Broken Link
http://www.phpmyadmin.net/home_page/security/PMASA-2009-3.php Patch Vendor Advisory
http://www.securityfocus.com/archive/1/504191/100/0/threaded Broken Link Third Party Advisory VDB Entry
http://www.securityfocus.com/bid/34236 Broken Link Third Party Advisory VDB Entry
https://www.exploit-db.com/exploits/8921 Exploit Third Party Advisory VDB Entry
Configurations

Configuration 1 (hide)

OR cpe:2.3:a:phpmyadmin:phpmyadmin:*:*:*:*:*:*:*:*
cpe:2.3:a:phpmyadmin:phpmyadmin:*:*:*:*:*:*:*:*

Configuration 2 (hide)

OR cpe:2.3:o:debian:debian_linux:4.0:*:*:*:*:*:*:*
cpe:2.3:o:debian:debian_linux:5.0:*:*:*:*:*:*:*

History

21 Nov 2024, 01:01

Type Values Removed Values Added
References () http://labs.neohapsis.com/2009/04/06/about-cve-2009-1151/ - Broken Link () http://labs.neohapsis.com/2009/04/06/about-cve-2009-1151/ - Broken Link
References () http://lists.opensuse.org/opensuse-security-announce/2009-04/msg00003.html - Product () http://lists.opensuse.org/opensuse-security-announce/2009-04/msg00003.html - Product
References () http://phpmyadmin.svn.sourceforge.net/viewvc/phpmyadmin/branches/MAINT_2_11_9/phpMyAdmin/scripts/setup.php?r1=11514&r2=12301&pathrev=12301 - Vendor Advisory () http://phpmyadmin.svn.sourceforge.net/viewvc/phpmyadmin/branches/MAINT_2_11_9/phpMyAdmin/scripts/setup.php?r1=11514&r2=12301&pathrev=12301 - Vendor Advisory
References () http://secunia.com/advisories/34430 - Broken Link, Vendor Advisory () http://secunia.com/advisories/34430 - Broken Link, Vendor Advisory
References () http://secunia.com/advisories/34642 - Broken Link, Vendor Advisory () http://secunia.com/advisories/34642 - Broken Link, Vendor Advisory
References () http://secunia.com/advisories/35585 - Broken Link, Vendor Advisory () http://secunia.com/advisories/35585 - Broken Link, Vendor Advisory
References () http://secunia.com/advisories/35635 - Broken Link, Vendor Advisory () http://secunia.com/advisories/35635 - Broken Link, Vendor Advisory
References () http://security.gentoo.org/glsa/glsa-200906-03.xml - Third Party Advisory () http://security.gentoo.org/glsa/glsa-200906-03.xml - Third Party Advisory
References () http://www.debian.org/security/2009/dsa-1824 - Mailing List () http://www.debian.org/security/2009/dsa-1824 - Mailing List
References () http://www.gnucitizen.org/blog/cve-2009-1151-phpmyadmin-remote-code-execution-proof-of-concept/ - Exploit, Issue Tracking () http://www.gnucitizen.org/blog/cve-2009-1151-phpmyadmin-remote-code-execution-proof-of-concept/ - Exploit, Issue Tracking
References () http://www.mandriva.com/security/advisories?name=MDVSA-2009:115 - Broken Link () http://www.mandriva.com/security/advisories?name=MDVSA-2009:115 - Broken Link
References () http://www.phpmyadmin.net/home_page/security/PMASA-2009-3.php - Patch, Vendor Advisory () http://www.phpmyadmin.net/home_page/security/PMASA-2009-3.php - Patch, Vendor Advisory
References () http://www.securityfocus.com/archive/1/504191/100/0/threaded - Broken Link, Third Party Advisory, VDB Entry () http://www.securityfocus.com/archive/1/504191/100/0/threaded - Broken Link, Third Party Advisory, VDB Entry
References () http://www.securityfocus.com/bid/34236 - Broken Link, Third Party Advisory, VDB Entry () http://www.securityfocus.com/bid/34236 - Broken Link, Third Party Advisory, VDB Entry
References () https://www.exploit-db.com/exploits/8921 - Exploit, Third Party Advisory, VDB Entry () https://www.exploit-db.com/exploits/8921 - Exploit, Third Party Advisory, VDB Entry

16 Jul 2024, 17:48

Type Values Removed Values Added
References () http://labs.neohapsis.com/2009/04/06/about-cve-2009-1151/ - () http://labs.neohapsis.com/2009/04/06/about-cve-2009-1151/ - Broken Link
References () http://lists.opensuse.org/opensuse-security-announce/2009-04/msg00003.html - () http://lists.opensuse.org/opensuse-security-announce/2009-04/msg00003.html - Product
References () http://secunia.com/advisories/34430 - Vendor Advisory () http://secunia.com/advisories/34430 - Broken Link, Vendor Advisory
References () http://secunia.com/advisories/34642 - Vendor Advisory () http://secunia.com/advisories/34642 - Broken Link, Vendor Advisory
References () http://secunia.com/advisories/35585 - Vendor Advisory () http://secunia.com/advisories/35585 - Broken Link, Vendor Advisory
References () http://secunia.com/advisories/35635 - Vendor Advisory () http://secunia.com/advisories/35635 - Broken Link, Vendor Advisory
References () http://security.gentoo.org/glsa/glsa-200906-03.xml - () http://security.gentoo.org/glsa/glsa-200906-03.xml - Third Party Advisory
References () http://www.debian.org/security/2009/dsa-1824 - () http://www.debian.org/security/2009/dsa-1824 - Mailing List
References () http://www.gnucitizen.org/blog/cve-2009-1151-phpmyadmin-remote-code-execution-proof-of-concept/ - () http://www.gnucitizen.org/blog/cve-2009-1151-phpmyadmin-remote-code-execution-proof-of-concept/ - Exploit, Issue Tracking
References () http://www.mandriva.com/security/advisories?name=MDVSA-2009:115 - () http://www.mandriva.com/security/advisories?name=MDVSA-2009:115 - Broken Link
References () http://www.securityfocus.com/archive/1/504191/100/0/threaded - () http://www.securityfocus.com/archive/1/504191/100/0/threaded - Broken Link, Third Party Advisory, VDB Entry
References () http://www.securityfocus.com/bid/34236 - () http://www.securityfocus.com/bid/34236 - Broken Link, Third Party Advisory, VDB Entry
References () https://www.exploit-db.com/exploits/8921 - () https://www.exploit-db.com/exploits/8921 - Exploit, Third Party Advisory, VDB Entry
CPE cpe:2.3:a:phpmyadmin:phpmyadmin:2.11.8:*:*:*:*:*:*:*
cpe:2.3:a:phpmyadmin:phpmyadmin:2.11.3:rc1:*:*:*:*:*:*
cpe:2.3:a:phpmyadmin:phpmyadmin:2.11.9:*:*:*:*:*:*:*
cpe:2.3:a:phpmyadmin:phpmyadmin:2.11.2.1:*:*:*:*:*:*:*
cpe:2.3:a:phpmyadmin:phpmyadmin:2.11.1:*:*:*:*:*:*:*
cpe:2.3:a:phpmyadmin:phpmyadmin:2.11.7:*:*:*:*:*:*:*
cpe:2.3:a:phpmyadmin:phpmyadmin:2.11.2.0:*:*:*:*:*:*:*
cpe:2.3:a:phpmyadmin:phpmyadmin:2.11.9.4:*:*:*:*:*:*:*
cpe:2.3:a:phpmyadmin:phpmyadmin:2.11.9.2:*:*:*:*:*:*:*
cpe:2.3:a:phpmyadmin:phpmyadmin:3.1.3:rc1:*:*:*:*:*:*
cpe:2.3:a:phpmyadmin:phpmyadmin:2.11.4:rc1:*:*:*:*:*:*
cpe:2.3:a:phpmyadmin:phpmyadmin:2.11.5.2:*:*:*:*:*:*:*
cpe:2.3:a:phpmyadmin:phpmyadmin:3.1.1:*:*:*:*:*:*:*
cpe:2.3:a:phpmyadmin:phpmyadmin:2.11.0:rc1:*:*:*:*:*:*
cpe:2.3:a:phpmyadmin:phpmyadmin:2.11.2.2:*:*:*:*:*:*:*
cpe:2.3:a:phpmyadmin:phpmyadmin:2.11.1:rc1:*:*:*:*:*:*
cpe:2.3:a:phpmyadmin:phpmyadmin:2.11.7.0:*:*:*:*:*:*:*
cpe:2.3:a:phpmyadmin:phpmyadmin:2.11.9.0:*:*:*:*:*:*:*
cpe:2.3:a:phpmyadmin:phpmyadmin:2.11.5:rc1:*:*:*:*:*:*
cpe:2.3:a:phpmyadmin:phpmyadmin:3.1.0:*:*:*:*:*:*:*
cpe:2.3:a:phpmyadmin:phpmyadmin:2.11.6:*:*:*:*:*:*:*
cpe:2.3:a:phpmyadmin:phpmyadmin:2.11.5:*:*:*:*:*:*:*
cpe:2.3:a:phpmyadmin:phpmyadmin:2.11.3:*:*:*:*:*:*:*
cpe:2.3:a:phpmyadmin:phpmyadmin:2.11.9.3:*:*:*:*:*:*:*
cpe:2.3:a:phpmyadmin:phpmyadmin:2.11.0:beta1:*:*:*:*:*:*
cpe:2.3:a:phpmyadmin:phpmyadmin:3.1.2:rc1:*:*:*:*:*:*
cpe:2.3:a:phpmyadmin:phpmyadmin:2.11.3.0:*:*:*:*:*:*:*
cpe:2.3:a:phpmyadmin:phpmyadmin:2.11.6.0:*:*:*:*:*:*:*
cpe:2.3:a:phpmyadmin:phpmyadmin:2.11.9.1:*:*:*:*:*:*:*
cpe:2.3:a:phpmyadmin:phpmyadmin:2.11.1.1:*:*:*:*:*:*:*
cpe:2.3:a:phpmyadmin:phpmyadmin:2.11.1.0:*:*:*:*:*:*:*
cpe:2.3:a:phpmyadmin:phpmyadmin:3.1.1:rc1:*:*:*:*:*:*
cpe:2.3:a:phpmyadmin:phpmyadmin:3.1.2:*:*:*:*:*:*:*
cpe:2.3:a:phpmyadmin:phpmyadmin:2.11.2:*:*:*:*:*:*:*
cpe:2.3:a:phpmyadmin:phpmyadmin:2.11.0:*:*:*:*:*:*:*
cpe:2.3:a:phpmyadmin:phpmyadmin:2.11.6:rc1:*:*:*:*:*:*
cpe:2.3:a:phpmyadmin:phpmyadmin:2.11.1.2:*:*:*:*:*:*:*
cpe:2.3:a:phpmyadmin:phpmyadmin:2.11.4:*:*:*:*:*:*:*
cpe:2.3:a:phpmyadmin:phpmyadmin:2.11.5.0:*:*:*:*:*:*:*
cpe:2.3:a:phpmyadmin:phpmyadmin:2.11.5.1:*:*:*:*:*:*:*
cpe:2.3:o:debian:debian_linux:4.0:*:*:*:*:*:*:*
cpe:2.3:o:debian:debian_linux:5.0:*:*:*:*:*:*:*
First Time Debian
Debian debian Linux
CVSS v2 : 7.5
v3 : unknown
v2 : 7.5
v3 : 9.8

Information

Published : 2009-03-26 14:30

Updated : 2024-11-21 01:01


NVD link : CVE-2009-1151

Mitre link : CVE-2009-1151

CVE.ORG link : CVE-2009-1151


JSON object : View

Products Affected

debian

  • debian_linux

phpmyadmin

  • phpmyadmin
CWE
CWE-94

Improper Control of Generation of Code ('Code Injection')