Static code injection vulnerability in setup.php in phpMyAdmin 2.11.x before 2.11.9.5 and 3.x before 3.1.3.1 allows remote attackers to inject arbitrary PHP code into a configuration file via the save action.
References
Configurations
History
21 Nov 2024, 01:01
Type | Values Removed | Values Added |
---|---|---|
References | () http://labs.neohapsis.com/2009/04/06/about-cve-2009-1151/ - Broken Link | |
References | () http://lists.opensuse.org/opensuse-security-announce/2009-04/msg00003.html - Product | |
References | () http://phpmyadmin.svn.sourceforge.net/viewvc/phpmyadmin/branches/MAINT_2_11_9/phpMyAdmin/scripts/setup.php?r1=11514&r2=12301&pathrev=12301 - Vendor Advisory | |
References | () http://secunia.com/advisories/34430 - Broken Link, Vendor Advisory | |
References | () http://secunia.com/advisories/34642 - Broken Link, Vendor Advisory | |
References | () http://secunia.com/advisories/35585 - Broken Link, Vendor Advisory | |
References | () http://secunia.com/advisories/35635 - Broken Link, Vendor Advisory | |
References | () http://security.gentoo.org/glsa/glsa-200906-03.xml - Third Party Advisory | |
References | () http://www.debian.org/security/2009/dsa-1824 - Mailing List | |
References | () http://www.gnucitizen.org/blog/cve-2009-1151-phpmyadmin-remote-code-execution-proof-of-concept/ - Exploit, Issue Tracking | |
References | () http://www.mandriva.com/security/advisories?name=MDVSA-2009:115 - Broken Link | |
References | () http://www.phpmyadmin.net/home_page/security/PMASA-2009-3.php - Patch, Vendor Advisory | |
References | () http://www.securityfocus.com/archive/1/504191/100/0/threaded - Broken Link, Third Party Advisory, VDB Entry | |
References | () http://www.securityfocus.com/bid/34236 - Broken Link, Third Party Advisory, VDB Entry | |
References | () https://www.exploit-db.com/exploits/8921 - Exploit, Third Party Advisory, VDB Entry |
16 Jul 2024, 17:48
Type | Values Removed | Values Added |
---|---|---|
References | () http://labs.neohapsis.com/2009/04/06/about-cve-2009-1151/ - Broken Link | |
References | () http://lists.opensuse.org/opensuse-security-announce/2009-04/msg00003.html - Product | |
References | () http://secunia.com/advisories/34430 - Broken Link, Vendor Advisory | |
References | () http://secunia.com/advisories/34642 - Broken Link, Vendor Advisory | |
References | () http://secunia.com/advisories/35585 - Broken Link, Vendor Advisory | |
References | () http://secunia.com/advisories/35635 - Broken Link, Vendor Advisory | |
References | () http://security.gentoo.org/glsa/glsa-200906-03.xml - Third Party Advisory | |
References | () http://www.debian.org/security/2009/dsa-1824 - Mailing List | |
References | () http://www.gnucitizen.org/blog/cve-2009-1151-phpmyadmin-remote-code-execution-proof-of-concept/ - Exploit, Issue Tracking | |
References | () http://www.mandriva.com/security/advisories?name=MDVSA-2009:115 - Broken Link | |
References | () http://www.securityfocus.com/archive/1/504191/100/0/threaded - Broken Link, Third Party Advisory, VDB Entry | |
References | () http://www.securityfocus.com/bid/34236 - Broken Link, Third Party Advisory, VDB Entry | |
References | () https://www.exploit-db.com/exploits/8921 - Exploit, Third Party Advisory, VDB Entry | |
CPE | cpe:2.3:a:phpmyadmin:phpmyadmin:2.11.3:rc1:*:*:*:*:*:* cpe:2.3:a:phpmyadmin:phpmyadmin:2.11.9:*:*:*:*:*:*:* cpe:2.3:a:phpmyadmin:phpmyadmin:2.11.2.1:*:*:*:*:*:*:* cpe:2.3:a:phpmyadmin:phpmyadmin:2.11.1:*:*:*:*:*:*:* cpe:2.3:a:phpmyadmin:phpmyadmin:2.11.7:*:*:*:*:*:*:* cpe:2.3:a:phpmyadmin:phpmyadmin:2.11.2.0:*:*:*:*:*:*:* cpe:2.3:a:phpmyadmin:phpmyadmin:2.11.9.4:*:*:*:*:*:*:* cpe:2.3:a:phpmyadmin:phpmyadmin:2.11.9.2:*:*:*:*:*:*:* cpe:2.3:a:phpmyadmin:phpmyadmin:3.1.3:rc1:*:*:*:*:*:* cpe:2.3:a:phpmyadmin:phpmyadmin:2.11.4:rc1:*:*:*:*:*:* cpe:2.3:a:phpmyadmin:phpmyadmin:2.11.5.2:*:*:*:*:*:*:* cpe:2.3:a:phpmyadmin:phpmyadmin:3.1.1:*:*:*:*:*:*:* cpe:2.3:a:phpmyadmin:phpmyadmin:2.11.0:rc1:*:*:*:*:*:* cpe:2.3:a:phpmyadmin:phpmyadmin:2.11.2.2:*:*:*:*:*:*:* cpe:2.3:a:phpmyadmin:phpmyadmin:2.11.1:rc1:*:*:*:*:*:* cpe:2.3:a:phpmyadmin:phpmyadmin:2.11.7.0:*:*:*:*:*:*:* cpe:2.3:a:phpmyadmin:phpmyadmin:2.11.9.0:*:*:*:*:*:*:* cpe:2.3:a:phpmyadmin:phpmyadmin:2.11.5:rc1:*:*:*:*:*:* cpe:2.3:a:phpmyadmin:phpmyadmin:3.1.0:*:*:*:*:*:*:* cpe:2.3:a:phpmyadmin:phpmyadmin:2.11.6:*:*:*:*:*:*:* cpe:2.3:a:phpmyadmin:phpmyadmin:2.11.5:*:*:*:*:*:*:* cpe:2.3:a:phpmyadmin:phpmyadmin:2.11.3:*:*:*:*:*:*:* cpe:2.3:a:phpmyadmin:phpmyadmin:2.11.9.3:*:*:*:*:*:*:* cpe:2.3:a:phpmyadmin:phpmyadmin:2.11.0:beta1:*:*:*:*:*:* cpe:2.3:a:phpmyadmin:phpmyadmin:3.1.2:rc1:*:*:*:*:*:* cpe:2.3:a:phpmyadmin:phpmyadmin:2.11.3.0:*:*:*:*:*:*:* cpe:2.3:a:phpmyadmin:phpmyadmin:2.11.6.0:*:*:*:*:*:*:* cpe:2.3:a:phpmyadmin:phpmyadmin:2.11.9.1:*:*:*:*:*:*:* cpe:2.3:a:phpmyadmin:phpmyadmin:2.11.1.1:*:*:*:*:*:*:* cpe:2.3:a:phpmyadmin:phpmyadmin:2.11.1.0:*:*:*:*:*:*:* cpe:2.3:a:phpmyadmin:phpmyadmin:3.1.1:rc1:*:*:*:*:*:* cpe:2.3:a:phpmyadmin:phpmyadmin:3.1.2:*:*:*:*:*:*:* cpe:2.3:a:phpmyadmin:phpmyadmin:2.11.2:*:*:*:*:*:*:* cpe:2.3:a:phpmyadmin:phpmyadmin:2.11.0:*:*:*:*:*:*:* cpe:2.3:a:phpmyadmin:phpmyadmin:2.11.6:rc1:*:*:*:*:*:* cpe:2.3:a:phpmyadmin:phpmyadmin:2.11.1.2:*:*:*:*:*:*:* cpe:2.3:a:phpmyadmin:phpmyadmin:2.11.4:*:*:*:*:*:*:* cpe:2.3:a:phpmyadmin:phpmyadmin:2.11.5.0:*:*:*:*:*:*:* cpe:2.3:a:phpmyadmin:phpmyadmin:2.11.5.1:*:*:*:*:*:*:* |
cpe:2.3:o:debian:debian_linux:4.0:*:*:*:*:*:*:* cpe:2.3:o:debian:debian_linux:5.0:*:*:*:*:*:*:* |
First Time |
Debian
Debian debian Linux |
|
CVSS |
v2 : v3 : |
v2 : 7.5
v3 : 9.8 |
Information
Published : 2009-03-26 14:30
Updated : 2024-11-21 01:01
NVD link : CVE-2009-1151
Mitre link : CVE-2009-1151
CVE.ORG link : CVE-2009-1151
JSON object : View
Products Affected
debian
- debian_linux
phpmyadmin
- phpmyadmin
CWE
CWE-94
Improper Control of Generation of Code ('Code Injection')