CVE-2013-3239

phpMyAdmin 3.5.x before 3.5.8 and 4.x before 4.0.0-rc3, when a SaveDir directory is configured, allows remote authenticated users to execute arbitrary code by using a double extension in the filename of an export file, leading to interpretation of this file as an executable file by the Apache HTTP Server, as demonstrated by a .php.sql filename.
References
Link Resource
http://archives.neohapsis.com/archives/bugtraq/2013-04/0217.html
http://lists.fedoraproject.org/pipermail/package-announce/2013-May/104725.html
http://lists.fedoraproject.org/pipermail/package-announce/2013-May/104770.html
http://lists.fedoraproject.org/pipermail/package-announce/2013-May/104936.html
http://lists.opensuse.org/opensuse-updates/2013-06/msg00181.html
http://www.mandriva.com/security/advisories?name=MDVSA-2013:160
http://www.phpmyadmin.net/home_page/security/PMASA-2013-3.php Vendor Advisory
https://github.com/phpmyadmin/phpmyadmin/commit/1f6bc0b707002e26cab216b9e57b4d5de764de48 Exploit Patch
https://github.com/phpmyadmin/phpmyadmin/commit/d3fafdfba0807068196655e9b6d16c5d1d3ccf8a
https://wiki.mageia.org/en/Support/Advisories/MGASA-2013-0133
http://archives.neohapsis.com/archives/bugtraq/2013-04/0217.html
http://lists.fedoraproject.org/pipermail/package-announce/2013-May/104725.html
http://lists.fedoraproject.org/pipermail/package-announce/2013-May/104770.html
http://lists.fedoraproject.org/pipermail/package-announce/2013-May/104936.html
http://lists.opensuse.org/opensuse-updates/2013-06/msg00181.html
http://www.mandriva.com/security/advisories?name=MDVSA-2013:160
http://www.phpmyadmin.net/home_page/security/PMASA-2013-3.php Vendor Advisory
https://github.com/phpmyadmin/phpmyadmin/commit/1f6bc0b707002e26cab216b9e57b4d5de764de48 Exploit Patch
https://github.com/phpmyadmin/phpmyadmin/commit/d3fafdfba0807068196655e9b6d16c5d1d3ccf8a
https://wiki.mageia.org/en/Support/Advisories/MGASA-2013-0133
Configurations

Configuration 1 (hide)

OR cpe:2.3:a:phpmyadmin:phpmyadmin:3.5.0.0:*:*:*:*:*:*:*
cpe:2.3:a:phpmyadmin:phpmyadmin:3.5.1.0:*:*:*:*:*:*:*
cpe:2.3:a:phpmyadmin:phpmyadmin:3.5.2.0:*:*:*:*:*:*:*
cpe:2.3:a:phpmyadmin:phpmyadmin:3.5.2.1:*:*:*:*:*:*:*
cpe:2.3:a:phpmyadmin:phpmyadmin:3.5.2.2:*:*:*:*:*:*:*
cpe:2.3:a:phpmyadmin:phpmyadmin:3.5.3.0:*:*:*:*:*:*:*
cpe:2.3:a:phpmyadmin:phpmyadmin:3.5.4:*:*:*:*:*:*:*
cpe:2.3:a:phpmyadmin:phpmyadmin:3.5.5:*:*:*:*:*:*:*
cpe:2.3:a:phpmyadmin:phpmyadmin:3.5.6:*:*:*:*:*:*:*
cpe:2.3:a:phpmyadmin:phpmyadmin:3.5.7:*:*:*:*:*:*:*
cpe:2.3:a:phpmyadmin:phpmyadmin:3.5.7:rc1:*:*:*:*:*:*
cpe:2.3:a:phpmyadmin:phpmyadmin:3.5.8:rc1:*:*:*:*:*:*
cpe:2.3:a:phpmyadmin:phpmyadmin:4.0.0:rc2:*:*:*:*:*:*

History

21 Nov 2024, 01:53

Type Values Removed Values Added
References () http://archives.neohapsis.com/archives/bugtraq/2013-04/0217.html - () http://archives.neohapsis.com/archives/bugtraq/2013-04/0217.html -
References () http://lists.fedoraproject.org/pipermail/package-announce/2013-May/104725.html - () http://lists.fedoraproject.org/pipermail/package-announce/2013-May/104725.html -
References () http://lists.fedoraproject.org/pipermail/package-announce/2013-May/104770.html - () http://lists.fedoraproject.org/pipermail/package-announce/2013-May/104770.html -
References () http://lists.fedoraproject.org/pipermail/package-announce/2013-May/104936.html - () http://lists.fedoraproject.org/pipermail/package-announce/2013-May/104936.html -
References () http://lists.opensuse.org/opensuse-updates/2013-06/msg00181.html - () http://lists.opensuse.org/opensuse-updates/2013-06/msg00181.html -
References () http://www.mandriva.com/security/advisories?name=MDVSA-2013:160 - () http://www.mandriva.com/security/advisories?name=MDVSA-2013:160 -
References () http://www.phpmyadmin.net/home_page/security/PMASA-2013-3.php - Vendor Advisory () http://www.phpmyadmin.net/home_page/security/PMASA-2013-3.php - Vendor Advisory
References () https://github.com/phpmyadmin/phpmyadmin/commit/1f6bc0b707002e26cab216b9e57b4d5de764de48 - Exploit, Patch () https://github.com/phpmyadmin/phpmyadmin/commit/1f6bc0b707002e26cab216b9e57b4d5de764de48 - Exploit, Patch
References () https://github.com/phpmyadmin/phpmyadmin/commit/d3fafdfba0807068196655e9b6d16c5d1d3ccf8a - () https://github.com/phpmyadmin/phpmyadmin/commit/d3fafdfba0807068196655e9b6d16c5d1d3ccf8a -
References () https://wiki.mageia.org/en/Support/Advisories/MGASA-2013-0133 - () https://wiki.mageia.org/en/Support/Advisories/MGASA-2013-0133 -

Information

Published : 2013-04-26 03:34

Updated : 2024-11-21 01:53


NVD link : CVE-2013-3239

Mitre link : CVE-2013-3239

CVE.ORG link : CVE-2013-3239


JSON object : View

Products Affected

phpmyadmin

  • phpmyadmin
CWE
CWE-94

Improper Control of Generation of Code ('Code Injection')