CVE-2011-2719

libraries/auth/swekey/swekey.auth.lib.php in phpMyAdmin 3.x before 3.3.10.3 and 3.4.x before 3.4.3.2 does not properly manage sessions associated with Swekey authentication, which allows remote attackers to modify the SESSION superglobal array, other superglobal arrays, and certain swekey.auth.lib.php local variables via a crafted query string, a related issue to CVE-2011-2505.
References
Link Resource
http://lists.fedoraproject.org/pipermail/package-announce/2011-August/063410.html
http://lists.fedoraproject.org/pipermail/package-announce/2011-August/063418.html
http://osvdb.org/74112
http://phpmyadmin.git.sourceforge.net/git/gitweb.cgi?p=phpmyadmin/phpmyadmin%3Ba=commit%3Bh=571cdc6ff4bf375871b594f4e06f8ad3159d1754
http://phpmyadmin.git.sourceforge.net/git/gitweb.cgi?p=phpmyadmin/phpmyadmin%3Ba=commit%3Bh=e7bb42c002885c2aca7aba4d431b8c63ae4de9b7
http://seclists.org/fulldisclosure/2011/Jul/300
http://secunia.com/advisories/45315
http://secunia.com/advisories/45365 Vendor Advisory
http://secunia.com/advisories/45515
http://securityreason.com/securityalert/8322
http://www.debian.org/security/2011/dsa-2286
http://www.mandriva.com/security/advisories?name=MDVSA-2011:124
http://www.openwall.com/lists/oss-security/2011/07/25/4 Patch
http://www.openwall.com/lists/oss-security/2011/07/26/10 Patch
http://www.phpmyadmin.net/home_page/security/PMASA-2011-12.php Patch Vendor Advisory
http://www.securityfocus.com/archive/1/518967/100/0/threaded
http://www.securityfocus.com/archive/1/519155/100/0/threaded
http://www.securityfocus.com/bid/48874
http://www.xxor.se/advisories/phpMyAdmin_3.x_Conditional_Session_Manipulation.txt
https://bugzilla.redhat.com/show_bug.cgi?id=725384 Patch
https://exchange.xforce.ibmcloud.com/vulnerabilities/68769
http://lists.fedoraproject.org/pipermail/package-announce/2011-August/063410.html
http://lists.fedoraproject.org/pipermail/package-announce/2011-August/063418.html
http://osvdb.org/74112
http://phpmyadmin.git.sourceforge.net/git/gitweb.cgi?p=phpmyadmin/phpmyadmin%3Ba=commit%3Bh=571cdc6ff4bf375871b594f4e06f8ad3159d1754
http://phpmyadmin.git.sourceforge.net/git/gitweb.cgi?p=phpmyadmin/phpmyadmin%3Ba=commit%3Bh=e7bb42c002885c2aca7aba4d431b8c63ae4de9b7
http://seclists.org/fulldisclosure/2011/Jul/300
http://secunia.com/advisories/45315
http://secunia.com/advisories/45365 Vendor Advisory
http://secunia.com/advisories/45515
http://securityreason.com/securityalert/8322
http://www.debian.org/security/2011/dsa-2286
http://www.mandriva.com/security/advisories?name=MDVSA-2011:124
http://www.openwall.com/lists/oss-security/2011/07/25/4 Patch
http://www.openwall.com/lists/oss-security/2011/07/26/10 Patch
http://www.phpmyadmin.net/home_page/security/PMASA-2011-12.php Patch Vendor Advisory
http://www.securityfocus.com/archive/1/518967/100/0/threaded
http://www.securityfocus.com/archive/1/519155/100/0/threaded
http://www.securityfocus.com/bid/48874
http://www.xxor.se/advisories/phpMyAdmin_3.x_Conditional_Session_Manipulation.txt
https://bugzilla.redhat.com/show_bug.cgi?id=725384 Patch
https://exchange.xforce.ibmcloud.com/vulnerabilities/68769
Configurations

Configuration 1 (hide)

OR cpe:2.3:a:phpmyadmin:phpmyadmin:3.0.0:*:*:*:*:*:*:*
cpe:2.3:a:phpmyadmin:phpmyadmin:3.0.0:alpha:*:*:*:*:*:*
cpe:2.3:a:phpmyadmin:phpmyadmin:3.0.0:beta:*:*:*:*:*:*
cpe:2.3:a:phpmyadmin:phpmyadmin:3.0.0:rc1:*:*:*:*:*:*
cpe:2.3:a:phpmyadmin:phpmyadmin:3.0.1:*:*:*:*:*:*:*
cpe:2.3:a:phpmyadmin:phpmyadmin:3.0.1:rc1:*:*:*:*:*:*
cpe:2.3:a:phpmyadmin:phpmyadmin:3.0.1.1:*:*:*:*:*:*:*
cpe:2.3:a:phpmyadmin:phpmyadmin:3.1.0:*:*:*:*:*:*:*
cpe:2.3:a:phpmyadmin:phpmyadmin:3.1.0:beta1:*:*:*:*:*:*
cpe:2.3:a:phpmyadmin:phpmyadmin:3.1.1:*:*:*:*:*:*:*
cpe:2.3:a:phpmyadmin:phpmyadmin:3.1.1:rc1:*:*:*:*:*:*
cpe:2.3:a:phpmyadmin:phpmyadmin:3.1.2:*:*:*:*:*:*:*
cpe:2.3:a:phpmyadmin:phpmyadmin:3.1.2:rc1:*:*:*:*:*:*
cpe:2.3:a:phpmyadmin:phpmyadmin:3.1.3:*:*:*:*:*:*:*
cpe:2.3:a:phpmyadmin:phpmyadmin:3.1.3:rc1:*:*:*:*:*:*
cpe:2.3:a:phpmyadmin:phpmyadmin:3.1.3.1:*:*:*:*:*:*:*
cpe:2.3:a:phpmyadmin:phpmyadmin:3.1.3.2:*:*:*:*:*:*:*
cpe:2.3:a:phpmyadmin:phpmyadmin:3.1.4:*:*:*:*:*:*:*
cpe:2.3:a:phpmyadmin:phpmyadmin:3.1.4:rc2:*:*:*:*:*:*
cpe:2.3:a:phpmyadmin:phpmyadmin:3.1.5:*:*:*:*:*:*:*
cpe:2.3:a:phpmyadmin:phpmyadmin:3.1.5:rc1:*:*:*:*:*:*
cpe:2.3:a:phpmyadmin:phpmyadmin:3.2.0:*:*:*:*:*:*:*
cpe:2.3:a:phpmyadmin:phpmyadmin:3.2.0:beta1:*:*:*:*:*:*
cpe:2.3:a:phpmyadmin:phpmyadmin:3.2.0:rc1:*:*:*:*:*:*
cpe:2.3:a:phpmyadmin:phpmyadmin:3.2.1:*:*:*:*:*:*:*
cpe:2.3:a:phpmyadmin:phpmyadmin:3.2.1:rc1:*:*:*:*:*:*
cpe:2.3:a:phpmyadmin:phpmyadmin:3.2.2:*:*:*:*:*:*:*
cpe:2.3:a:phpmyadmin:phpmyadmin:3.2.2:rc1:*:*:*:*:*:*
cpe:2.3:a:phpmyadmin:phpmyadmin:3.3.0.0:*:*:*:*:*:*:*
cpe:2.3:a:phpmyadmin:phpmyadmin:3.3.1.0:*:*:*:*:*:*:*
cpe:2.3:a:phpmyadmin:phpmyadmin:3.3.2.0:*:*:*:*:*:*:*
cpe:2.3:a:phpmyadmin:phpmyadmin:3.3.3.0:*:*:*:*:*:*:*
cpe:2.3:a:phpmyadmin:phpmyadmin:3.3.4.0:*:*:*:*:*:*:*
cpe:2.3:a:phpmyadmin:phpmyadmin:3.3.5.0:*:*:*:*:*:*:*
cpe:2.3:a:phpmyadmin:phpmyadmin:3.3.5.1:*:*:*:*:*:*:*
cpe:2.3:a:phpmyadmin:phpmyadmin:3.3.6:*:*:*:*:*:*:*
cpe:2.3:a:phpmyadmin:phpmyadmin:3.3.7:*:*:*:*:*:*:*
cpe:2.3:a:phpmyadmin:phpmyadmin:3.3.8:*:*:*:*:*:*:*
cpe:2.3:a:phpmyadmin:phpmyadmin:3.3.8.1:*:*:*:*:*:*:*
cpe:2.3:a:phpmyadmin:phpmyadmin:3.3.9.0:*:*:*:*:*:*:*
cpe:2.3:a:phpmyadmin:phpmyadmin:3.3.9.1:*:*:*:*:*:*:*
cpe:2.3:a:phpmyadmin:phpmyadmin:3.3.9.2:*:*:*:*:*:*:*
cpe:2.3:a:phpmyadmin:phpmyadmin:3.3.10.0:*:*:*:*:*:*:*
cpe:2.3:a:phpmyadmin:phpmyadmin:3.3.10.1:*:*:*:*:*:*:*
cpe:2.3:a:phpmyadmin:phpmyadmin:3.3.10.2:*:*:*:*:*:*:*

Configuration 2 (hide)

OR cpe:2.3:a:phpmyadmin:phpmyadmin:3.4.0.0:*:*:*:*:*:*:*
cpe:2.3:a:phpmyadmin:phpmyadmin:3.4.1.0:*:*:*:*:*:*:*
cpe:2.3:a:phpmyadmin:phpmyadmin:3.4.2.0:*:*:*:*:*:*:*
cpe:2.3:a:phpmyadmin:phpmyadmin:3.4.3.0:*:*:*:*:*:*:*
cpe:2.3:a:phpmyadmin:phpmyadmin:3.4.3.1:*:*:*:*:*:*:*

History

21 Nov 2024, 01:28

Type Values Removed Values Added
References () http://lists.fedoraproject.org/pipermail/package-announce/2011-August/063410.html - () http://lists.fedoraproject.org/pipermail/package-announce/2011-August/063410.html -
References () http://lists.fedoraproject.org/pipermail/package-announce/2011-August/063418.html - () http://lists.fedoraproject.org/pipermail/package-announce/2011-August/063418.html -
References () http://osvdb.org/74112 - () http://osvdb.org/74112 -
References () http://phpmyadmin.git.sourceforge.net/git/gitweb.cgi?p=phpmyadmin/phpmyadmin%3Ba=commit%3Bh=571cdc6ff4bf375871b594f4e06f8ad3159d1754 - () http://phpmyadmin.git.sourceforge.net/git/gitweb.cgi?p=phpmyadmin/phpmyadmin%3Ba=commit%3Bh=571cdc6ff4bf375871b594f4e06f8ad3159d1754 -
References () http://phpmyadmin.git.sourceforge.net/git/gitweb.cgi?p=phpmyadmin/phpmyadmin%3Ba=commit%3Bh=e7bb42c002885c2aca7aba4d431b8c63ae4de9b7 - () http://phpmyadmin.git.sourceforge.net/git/gitweb.cgi?p=phpmyadmin/phpmyadmin%3Ba=commit%3Bh=e7bb42c002885c2aca7aba4d431b8c63ae4de9b7 -
References () http://seclists.org/fulldisclosure/2011/Jul/300 - () http://seclists.org/fulldisclosure/2011/Jul/300 -
References () http://secunia.com/advisories/45315 - () http://secunia.com/advisories/45315 -
References () http://secunia.com/advisories/45365 - Vendor Advisory () http://secunia.com/advisories/45365 - Vendor Advisory
References () http://secunia.com/advisories/45515 - () http://secunia.com/advisories/45515 -
References () http://securityreason.com/securityalert/8322 - () http://securityreason.com/securityalert/8322 -
References () http://www.debian.org/security/2011/dsa-2286 - () http://www.debian.org/security/2011/dsa-2286 -
References () http://www.mandriva.com/security/advisories?name=MDVSA-2011:124 - () http://www.mandriva.com/security/advisories?name=MDVSA-2011:124 -
References () http://www.openwall.com/lists/oss-security/2011/07/25/4 - Patch () http://www.openwall.com/lists/oss-security/2011/07/25/4 - Patch
References () http://www.openwall.com/lists/oss-security/2011/07/26/10 - Patch () http://www.openwall.com/lists/oss-security/2011/07/26/10 - Patch
References () http://www.phpmyadmin.net/home_page/security/PMASA-2011-12.php - Patch, Vendor Advisory () http://www.phpmyadmin.net/home_page/security/PMASA-2011-12.php - Patch, Vendor Advisory
References () http://www.securityfocus.com/archive/1/518967/100/0/threaded - () http://www.securityfocus.com/archive/1/518967/100/0/threaded -
References () http://www.securityfocus.com/archive/1/519155/100/0/threaded - () http://www.securityfocus.com/archive/1/519155/100/0/threaded -
References () http://www.securityfocus.com/bid/48874 - () http://www.securityfocus.com/bid/48874 -
References () http://www.xxor.se/advisories/phpMyAdmin_3.x_Conditional_Session_Manipulation.txt - () http://www.xxor.se/advisories/phpMyAdmin_3.x_Conditional_Session_Manipulation.txt -
References () https://bugzilla.redhat.com/show_bug.cgi?id=725384 - Patch () https://bugzilla.redhat.com/show_bug.cgi?id=725384 - Patch
References () https://exchange.xforce.ibmcloud.com/vulnerabilities/68769 - () https://exchange.xforce.ibmcloud.com/vulnerabilities/68769 -

Information

Published : 2011-08-01 19:55

Updated : 2024-11-21 01:28


NVD link : CVE-2011-2719

Mitre link : CVE-2011-2719

CVE.ORG link : CVE-2011-2719


JSON object : View

Products Affected

phpmyadmin

  • phpmyadmin
CWE
CWE-20

Improper Input Validation