diff options
author | matthew <matthew@FreeBSD.org> | 2017-03-30 00:47:39 +0800 |
---|---|---|
committer | matthew <matthew@FreeBSD.org> | 2017-03-30 00:47:39 +0800 |
commit | 8e4df33dc8b7702c8a66f18d8b16c8a8da587b66 (patch) | |
tree | 89ef18b6c3ede9d75abae7be1b404b83bdc5f75d /security/vuxml | |
parent | 2d962f86a65b8567e16ffe67a18199d84efd5797 (diff) | |
download | freebsd-ports-gnome-8e4df33dc8b7702c8a66f18d8b16c8a8da587b66.tar.gz freebsd-ports-gnome-8e4df33dc8b7702c8a66f18d8b16c8a8da587b66.tar.zst freebsd-ports-gnome-8e4df33dc8b7702c8a66f18d8b16c8a8da587b66.zip |
phpMyAdmin: document PMASA-2017-8 -- bypass restrictions on 'no
password' accounts.
Diffstat (limited to 'security/vuxml')
-rw-r--r-- | security/vuxml/vuln.xml | 39 |
1 files changed, 39 insertions, 0 deletions
diff --git a/security/vuxml/vuln.xml b/security/vuxml/vuln.xml index 74366f0b42a2..53842ca88acd 100644 --- a/security/vuxml/vuln.xml +++ b/security/vuxml/vuln.xml @@ -58,6 +58,45 @@ Notes: * Do not forget port variants (linux-f10-libxml2, libxml2, etc.) --> <vuxml xmlns="http://www.vuxml.org/apps/vuxml-1"> + <vuln vid="68611303-149e-11e7-b9bb-6805ca0b3d42"> + <topic>phpMyAdmin -- bypass 'no password' restriction</topic> + <affects> + <package> + <name>phpMyAdmin</name> + <range><lt>4.7.0</lt></range> + </package> + </affects> + <description> + <body xmlns="http://www.w3.org/1999/xhtml"> + <p>The phpMYAdmin team reports:</p> + <blockquote cite="https://www.phpmyadmin.net/security/PMASA-2017-8/"> + <h3>Summary</h3> + <p>Bypass $cfg['Servers'][$i]['AllowNoPassword']</p> + <h3>Description</h3> + <p>A vulnerability was discovered where the restrictions + caused by $cfg['Servers'][$i]['AllowNoPassword'] = false are + bypassed under certain PHP versions. This can allow the + login of users who have no password set even if the + administrator has set $cfg['Servers'][$i]['AllowNoPassword'] + to false (which is also the default).</p> + <p>This behavior depends on the PHP version used (it seems + PHP 5 is affected, while PHP 7.0 is not).</p> + <h3>Severity</h3> + <p>We consider this vulnerability to be of moderate severity.</p> + <h3>Mitigation factor</h3> + <p>Set a password for all users.</p> + </blockquote> + </body> + </description> + <references> + <url>https://www.phpmyadmin.net/security/PMASA-2017-8/</url> + </references> + <dates> + <discovery>2017-03-28</discovery> + <entry>2017-03-29</entry> + </dates> + </vuln> + <vuln vid="04bc4e23-9a70-42cb-9fec-3613632d34bc"> <topic>hostapd -- multiple vulnerabilities</topic> <affects> |