security alert
This commit is contained in:
@@ -5,6 +5,9 @@ phpMyAdmin - Changelog
|
|||||||
$Id$
|
$Id$
|
||||||
$Source$
|
$Source$
|
||||||
|
|
||||||
|
2003-07-01 Marc Delisle <lem9@users.sourceforge.net>
|
||||||
|
* Documentation.html: faq 8.1 about security alert of 2003-06-18
|
||||||
|
|
||||||
2003-06-30 Marc Delisle <lem9@users.sourceforge.net>
|
2003-06-30 Marc Delisle <lem9@users.sourceforge.net>
|
||||||
* lang/french: update
|
* lang/french: update
|
||||||
|
|
||||||
|
@@ -2005,7 +2005,8 @@ To create a new, empty mimetype please see libraries/transformations/template_ge
|
|||||||
<a href="#faqmultiuser">Multi-user</a> -
|
<a href="#faqmultiuser">Multi-user</a> -
|
||||||
<a href="#faqbrowsers">Browsers</a> -
|
<a href="#faqbrowsers">Browsers</a> -
|
||||||
<a href="#faqusing">Usage tips</a> -
|
<a href="#faqusing">Usage tips</a> -
|
||||||
<a href="#faqproject">Project</a>
|
<a href="#faqproject">Project</a> -
|
||||||
|
<a href="#faqsecurity">Security</a>
|
||||||
</p>
|
</p>
|
||||||
|
|
||||||
<a name="faqserver"></a><br />
|
<a name="faqserver"></a><br />
|
||||||
@@ -3318,6 +3319,62 @@ To create a new, empty mimetype please see libraries/transformations/template_ge
|
|||||||
Also, have a look at the
|
Also, have a look at the
|
||||||
<a href="#developers">Developers section</a>.
|
<a href="#developers">Developers section</a>.
|
||||||
</p>
|
</p>
|
||||||
|
<a name="faqsecurity"></a><br />
|
||||||
|
<h3>[8. Security ]</h3>
|
||||||
|
|
||||||
|
<h4>
|
||||||
|
[8.1] Security alert, dated 2003-06-18.
|
||||||
|
</h4>
|
||||||
|
<p>
|
||||||
|
Last update of this FAQ: 2003-07-01.
|
||||||
|
<br /><br />
|
||||||
|
The phpMyAdmin's development team received notice of this
|
||||||
|
<a href="http://www.securityfocus.com/archive/1/325641" target="_blank">security alert.</a>
|
||||||
|
<br /><br />
|
||||||
|
|
||||||
|
The team regrets that the author did not communicate with us before
|
||||||
|
sending this alert. However, here is our current reply to the points mentionned:
|
||||||
|
<br /><br />
|
||||||
|
<ul>
|
||||||
|
<li>"Directory transversal attack"
|
||||||
|
<br /><br />
|
||||||
|
|
||||||
|
This problem had been fixed in version 2.5.0, even if the author reports
|
||||||
|
the 2.5.2 development version as vulnerable, which we could not reproduce.
|
||||||
|
<br /><br />
|
||||||
|
</li>
|
||||||
|
<li>"Remote local file retrieving"
|
||||||
|
<br /><br />
|
||||||
|
This is a misleading title, as the author tells in his text:
|
||||||
|
"Note that you can't request files ( only dirs )".
|
||||||
|
<br /><br />
|
||||||
|
</li>
|
||||||
|
|
||||||
|
<li>"Remote internal directory listing"
|
||||||
|
<br /><br />
|
||||||
|
It was possible to retrieve the list of phpMyAdmin's directory (which we
|
||||||
|
doubt can cause any damage), but we fixed this in the upcoming
|
||||||
|
2.5.2 version.
|
||||||
|
<br /><br />
|
||||||
|
</li>
|
||||||
|
|
||||||
|
<li>"XSS and Path disclosures"
|
||||||
|
<br /><br />
|
||||||
|
Most of the XSS problems have been fixed in version 2.5.0. The rest
|
||||||
|
have been fixed in the upcoming 2.5.2 version.
|
||||||
|
<br /><br />
|
||||||
|
We are currently looking at the Path disclosure issue.
|
||||||
|
<br /><br />
|
||||||
|
</li>
|
||||||
|
<li>"Information encoding weakness"
|
||||||
|
<br /><br />
|
||||||
|
We believe that an exploit for this weakness would be difficult
|
||||||
|
to achieve. However we are currently working to remove this weakness.
|
||||||
|
<br /><br />
|
||||||
|
</li>
|
||||||
|
</ul>
|
||||||
|
|
||||||
|
</p>
|
||||||
|
|
||||||
<!-- DEVELOPERS -->
|
<!-- DEVELOPERS -->
|
||||||
<a name="developers"></a><br />
|
<a name="developers"></a><br />
|
||||||
|
Reference in New Issue
Block a user