ALT-BU-2021-4765-12
Branch c9f2 update bulletin.
Closed vulnerabilities
BDU:2021-03403
Уязвимость функции _dbus_read_socket_with_unix_fds компонента dbus/dbus-sysdeps-unix.c системы межпроцессорного взаимодействия D-Bus, связанная с некорректным освобождением ресурсов, позволяющая нарушителю вызвать отказ в обслуживании
Modified: 2024-11-21
CVE-2020-12049
An issue was discovered in dbus >= 1.3.0 before 1.12.18. The DBusServer in libdbus, as used in dbus-daemon, leaks file descriptors when a message exceeds the per-message file descriptor limit. A local attacker with access to the D-Bus system bus or another system service's private AF_UNIX socket could use this to make the system service reach its file descriptor limit, denying service to subsequent D-Bus clients.
- http://packetstormsecurity.com/files/172840/D-Bus-File-Descriptor-Leak-Denial-Of-Service.html
- http://www.openwall.com/lists/oss-security/2020/06/04/3
- https://gitlab.freedesktop.org/dbus/dbus/-/issues/294
- https://gitlab.freedesktop.org/dbus/dbus/-/tags/dbus-1.10.30
- https://gitlab.freedesktop.org/dbus/dbus/-/tags/dbus-1.12.18
- https://gitlab.freedesktop.org/dbus/dbus/-/tags/dbus-1.13.16
- GLSA-202007-46
- https://securitylab.github.com/advisories/GHSL-2020-057-DBus-DoS-file-descriptor-leak
- USN-4398-1
- USN-4398-2
- http://packetstormsecurity.com/files/172840/D-Bus-File-Descriptor-Leak-Denial-Of-Service.html
- USN-4398-2
- USN-4398-1
- https://securitylab.github.com/advisories/GHSL-2020-057-DBus-DoS-file-descriptor-leak
- GLSA-202007-46
- https://gitlab.freedesktop.org/dbus/dbus/-/tags/dbus-1.13.16
- https://gitlab.freedesktop.org/dbus/dbus/-/tags/dbus-1.12.18
- https://gitlab.freedesktop.org/dbus/dbus/-/tags/dbus-1.10.30
- https://gitlab.freedesktop.org/dbus/dbus/-/issues/294
- http://www.openwall.com/lists/oss-security/2020/06/04/3
Closed vulnerabilities
BDU:2021-06392
Уязвимость HTTP-сервера Apache, связанная с выходом операции за границу буфера в памяти, позволяющая нарушителю выполнить произвольный код
BDU:2021-06393
Уязвимость HTTP-сервера Apache, связанная с подделкой запросов на стороне сервера, позволяющая нарушителю провести SSRF-атаку
Modified: 2024-11-21
CVE-2021-44224
A crafted URI sent to httpd configured as a forward proxy (ProxyRequests on) can cause a crash (NULL pointer dereference) or, for configurations mixing forward and reverse proxy declarations, can allow for requests to be directed to a declared Unix Domain Socket endpoint (Server Side Request Forgery). This issue affects Apache HTTP Server 2.4.7 up to 2.4.51 (included).
- http://httpd.apache.org/security/vulnerabilities_24.html
- http://httpd.apache.org/security/vulnerabilities_24.html
- 20220516 APPLE-SA-2022-05-16-4 Security Update 2022-004 Catalina
- 20220516 APPLE-SA-2022-05-16-4 Security Update 2022-004 Catalina
- 20220516 APPLE-SA-2022-05-16-3 macOS Big Sur 11.6.6
- 20220516 APPLE-SA-2022-05-16-3 macOS Big Sur 11.6.6
- 20220516 APPLE-SA-2022-05-16-2 macOS Monterey 12.4
- 20220516 APPLE-SA-2022-05-16-2 macOS Monterey 12.4
- [oss-security] 20211220 CVE-2021-44224: Apache HTTP Server: Possible NULL dereference or SSRF in forward proxy configurations in Apache HTTP Server 2.4.51 and earlier
- [oss-security] 20211220 CVE-2021-44224: Apache HTTP Server: Possible NULL dereference or SSRF in forward proxy configurations in Apache HTTP Server 2.4.51 and earlier
- FEDORA-2021-29a536c2ae
- FEDORA-2021-29a536c2ae
- FEDORA-2022-b4103753e9
- FEDORA-2022-b4103753e9
- FEDORA-2022-78e3211c55
- FEDORA-2022-78e3211c55
- FEDORA-2022-21264ec6db
- FEDORA-2022-21264ec6db
- GLSA-202208-20
- GLSA-202208-20
- https://security.netapp.com/advisory/ntap-20211224-0001/
- https://security.netapp.com/advisory/ntap-20211224-0001/
- https://support.apple.com/kb/HT213255
- https://support.apple.com/kb/HT213255
- https://support.apple.com/kb/HT213256
- https://support.apple.com/kb/HT213256
- https://support.apple.com/kb/HT213257
- https://support.apple.com/kb/HT213257
- DSA-5035
- DSA-5035
- https://www.oracle.com/security-alerts/cpuapr2022.html
- https://www.oracle.com/security-alerts/cpuapr2022.html
- https://www.oracle.com/security-alerts/cpujan2022.html
- https://www.oracle.com/security-alerts/cpujan2022.html
- https://www.tenable.com/security/tns-2022-01
- https://www.tenable.com/security/tns-2022-01
- https://www.tenable.com/security/tns-2022-03
- https://www.tenable.com/security/tns-2022-03
Modified: 2024-11-21
CVE-2021-44790
A carefully crafted request body can cause a buffer overflow in the mod_lua multipart parser (r:parsebody() called from Lua scripts). The Apache httpd team is not aware of an exploit for the vulnerabilty though it might be possible to craft one. This issue affects Apache HTTP Server 2.4.51 and earlier.
- http://httpd.apache.org/security/vulnerabilities_24.html
- http://httpd.apache.org/security/vulnerabilities_24.html
- http://packetstormsecurity.com/files/171631/Apache-2.4.x-Buffer-Overflow.html
- http://packetstormsecurity.com/files/171631/Apache-2.4.x-Buffer-Overflow.html
- 20220516 APPLE-SA-2022-05-16-4 Security Update 2022-004 Catalina
- 20220516 APPLE-SA-2022-05-16-4 Security Update 2022-004 Catalina
- 20220516 APPLE-SA-2022-05-16-3 macOS Big Sur 11.6.6
- 20220516 APPLE-SA-2022-05-16-3 macOS Big Sur 11.6.6
- 20220516 APPLE-SA-2022-05-16-2 macOS Monterey 12.4
- 20220516 APPLE-SA-2022-05-16-2 macOS Monterey 12.4
- [oss-security] 20211220 CVE-2021-44790: Apache HTTP Server: Possible buffer overflow when parsing multipart content in mod_lua of Apache HTTP Server 2.4.51 and earlier
- [oss-security] 20211220 CVE-2021-44790: Apache HTTP Server: Possible buffer overflow when parsing multipart content in mod_lua of Apache HTTP Server 2.4.51 and earlier
- FEDORA-2021-29a536c2ae
- FEDORA-2021-29a536c2ae
- FEDORA-2022-b4103753e9
- FEDORA-2022-b4103753e9
- FEDORA-2022-78e3211c55
- FEDORA-2022-78e3211c55
- FEDORA-2022-21264ec6db
- FEDORA-2022-21264ec6db
- GLSA-202208-20
- GLSA-202208-20
- https://security.netapp.com/advisory/ntap-20211224-0001/
- https://security.netapp.com/advisory/ntap-20211224-0001/
- https://support.apple.com/kb/HT213255
- https://support.apple.com/kb/HT213255
- https://support.apple.com/kb/HT213256
- https://support.apple.com/kb/HT213256
- https://support.apple.com/kb/HT213257
- https://support.apple.com/kb/HT213257
- DSA-5035
- DSA-5035
- https://www.oracle.com/security-alerts/cpuapr2022.html
- https://www.oracle.com/security-alerts/cpuapr2022.html
- https://www.oracle.com/security-alerts/cpujan2022.html
- https://www.oracle.com/security-alerts/cpujan2022.html
- https://www.tenable.com/security/tns-2022-01
- https://www.tenable.com/security/tns-2022-01
- https://www.tenable.com/security/tns-2022-03
- https://www.tenable.com/security/tns-2022-03
Closed bugs
Зависит от systemd
Closed vulnerabilities
BDU:2017-01814
Уязвимость функции zend_string_extend интерпретатора PHP, позволяющая нарушителю вызвать отказ в обслуживании или оказать другое воздействие
BDU:2021-03159
Уязвимость расширения SOAP интерпретатора PHP, позволяющая нарушителю вызвать аварийное завершение работы приложения
BDU:2021-05228
Уязвимость компонента SAPI расширения PHP-FPM интерпретатора языка программирования PHP, позволяющая нарушителю повысить свои привилегии до root
BDU:2021-06176
Уязвимость функции ZipArchive::extractTo интерпретатора PHP, позволяющая нарушителю создать или перезаписать файлы
BDU:2022-02394
Уязвимость функции simplexml_load_file() интерпретатора PHP , позволяющая нарушителю получить несанкционированный доступ к защищаемой информации
Modified: 2024-12-27
CVE-2017-8923
The zend_string_extend function in Zend/zend_string.h in PHP through 7.1.5 does not prevent changes to string objects that result in a negative length, which allows remote attackers to cause a denial of service (application crash) or possibly have unspecified other impact by leveraging a script's use of .= with a long string.
Modified: 2024-11-21
CVE-2021-21702
In PHP versions 7.3.x below 7.3.27, 7.4.x below 7.4.15 and 8.0.x below 8.0.2, when using SOAP extension to connect to a SOAP server, a malicious SOAP server could return malformed XML data as a response that would cause PHP to access a null pointer and thus cause a crash.
- https://bugs.php.net/bug.php?id=80672
- https://bugs.php.net/bug.php?id=80672
- [debian-lts-announce] 20210715 [SECURITY] [DLA 2708-1] php7.0 security update
- [debian-lts-announce] 20210715 [SECURITY] [DLA 2708-1] php7.0 security update
- GLSA-202105-23
- GLSA-202105-23
- https://security.netapp.com/advisory/ntap-20210312-0005/
- https://security.netapp.com/advisory/ntap-20210312-0005/
- DSA-4856
- DSA-4856
- https://www.oracle.com/security-alerts/cpuoct2021.html
- https://www.oracle.com/security-alerts/cpuoct2021.html
- https://www.tenable.com/security/tns-2021-14
- https://www.tenable.com/security/tns-2021-14
Modified: 2024-11-21
CVE-2021-21703
In PHP versions 7.3.x up to and including 7.3.31, 7.4.x below 7.4.25 and 8.0.x below 8.0.12, when running PHP FPM SAPI with main FPM daemon process running as root and child worker processes running as lower-privileged users, it is possible for the child processes to access memory shared with the main process and write to it, modifying it in a way that would cause the root process to conduct invalid memory reads and writes, which can be used to escalate privileges from local unprivileged user to the root user.
- [oss-security] 20211026 CVE-2021-21703: PHP-FPM 5.3.7 <= 8.0.12 Local Root
- [oss-security] 20211026 CVE-2021-21703: PHP-FPM 5.3.7 <= 8.0.12 Local Root
- https://bugs.php.net/bug.php?id=81026
- https://bugs.php.net/bug.php?id=81026
- [debian-lts-announce] 20211027 [SECURITY] [DLA 2794-1] php7.0 security update
- [debian-lts-announce] 20211027 [SECURITY] [DLA 2794-1] php7.0 security update
- FEDORA-2021-02d218c3be
- FEDORA-2021-02d218c3be
- FEDORA-2021-9f68f5f752
- FEDORA-2021-9f68f5f752
- FEDORA-2021-4140b54de2
- FEDORA-2021-4140b54de2
- GLSA-202209-20
- GLSA-202209-20
- https://security.netapp.com/advisory/ntap-20211118-0003/
- https://security.netapp.com/advisory/ntap-20211118-0003/
- DSA-4992
- DSA-4992
- DSA-4993
- DSA-4993
- https://www.oracle.com/security-alerts/cpuapr2022.html
- https://www.oracle.com/security-alerts/cpuapr2022.html
- https://www.oracle.com/security-alerts/cpujan2022.html
- https://www.oracle.com/security-alerts/cpujan2022.html
Modified: 2024-11-21
CVE-2021-21706
In PHP versions 7.3.x below 7.3.31, 7.4.x below 7.4.24 and 8.0.x below 8.0.11, in Microsoft Windows environment, ZipArchive::extractTo may be tricked into writing a file outside target directory when extracting a ZIP file, thus potentially causing files to be created or overwritten, subject to OS permissions.
Modified: 2024-11-21
CVE-2021-21707
In PHP versions 7.3.x below 7.3.33, 7.4.x below 7.4.26 and 8.0.x below 8.0.13, certain XML parsing functions, like simplexml_load_file(), URL-decode the filename passed to them. If that filename contains URL-encoded NUL character, this may cause the function to interpret this as the end of the filename, thus interpreting the filename differently from what the user intended, which may lead it to reading a different file than intended.
- https://bugs.php.net/bug.php?id=79971
- https://bugs.php.net/bug.php?id=79971
- [debian-lts-announce] 20221215 [SECURITY] [DLA 3243-1] php7.3 security update
- [debian-lts-announce] 20221215 [SECURITY] [DLA 3243-1] php7.3 security update
- https://security.netapp.com/advisory/ntap-20211223-0005/
- https://security.netapp.com/advisory/ntap-20211223-0005/
- DSA-5082
- DSA-5082
- https://www.tenable.com/security/tns-2022-09
- https://www.tenable.com/security/tns-2022-09
Package phpMyAdmin updated to version 5.1.1-alt1 for branch c9f2 in task 292351.
Closed vulnerabilities
BDU:2019-04000
Уязвимость веб-приложения для администрирования систем управления базами данных phpMyAdmin, связанная с подделкой межсайтовых запросов, позволяющая нарушителю удалить любой сервер на странице установки
BDU:2020-03949
Уязвимость функции конструктора (designer/move.js file) веб-приложения для администрирования систем управления базами данных phpMyAdmin, позволяющая нарушителю выполнить произвольный код
BDU:2021-01804
Уязвимость функции «Export» веб-приложения для администрирования систем управления базами данных phpMyAdmin, позволяющая нарушителю выполнить произвольный код
Modified: 2024-11-21
CVE-2019-11768
An issue was discovered in phpMyAdmin before 4.9.0.1. A vulnerability was reported where a specially crafted database name can be used to trigger an SQL injection attack through the designer feature.
Modified: 2024-11-21
CVE-2019-12616
An issue was discovered in phpMyAdmin before 4.9.0. A vulnerability was found that allows an attacker to trigger a CSRF attack against a phpMyAdmin user. The attacker can trick the user, for instance through a broken tag pointing at the victim's phpMyAdmin database, and the attacker can potentially deliver a payload (such as a specific INSERT or DELETE statement) to the victim.
- openSUSE-SU-2019:1689
- openSUSE-SU-2019:1689
- openSUSE-SU-2019:1861
- openSUSE-SU-2019:1861
- http://packetstormsecurity.com/files/153251/phpMyAdmin-4.8-Cross-Site-Request-Forgery.html
- http://packetstormsecurity.com/files/153251/phpMyAdmin-4.8-Cross-Site-Request-Forgery.html
- 108619
- 108619
- [debian-lts-announce] 20190617 [SECURITY] [DLA 1821-1] phpmyadmin security update
- [debian-lts-announce] 20190617 [SECURITY] [DLA 1821-1] phpmyadmin security update
- FEDORA-2019-13d2ba0aed
- FEDORA-2019-13d2ba0aed
- FEDORA-2019-33649e2e64
- FEDORA-2019-33649e2e64
- https://www.phpmyadmin.net/security/
- https://www.phpmyadmin.net/security/
- https://www.phpmyadmin.net/security/PMASA-2019-4/
- https://www.phpmyadmin.net/security/PMASA-2019-4/
Modified: 2024-11-21
CVE-2019-12922
A CSRF issue in phpMyAdmin 4.9.0.1 allows deletion of any server in the Setup page.
- openSUSE-SU-2019:2211
- openSUSE-SU-2019:2211
- openSUSE-SU-2020:0056
- openSUSE-SU-2020:0056
- http://packetstormsecurity.com/files/154483/phpMyAdmin-4.9.0.1-Cross-Site-Request-Forgery.html
- http://packetstormsecurity.com/files/154483/phpMyAdmin-4.9.0.1-Cross-Site-Request-Forgery.html
- http://seclists.org/fulldisclosure/2019/Sep/23
- http://seclists.org/fulldisclosure/2019/Sep/23
- https://github.com/phpmyadmin/phpmyadmin/commit/427fbed55d3154d96ecfc1c7784d49eaa3c04161
- https://github.com/phpmyadmin/phpmyadmin/commit/427fbed55d3154d96ecfc1c7784d49eaa3c04161
- https://github.com/phpmyadmin/phpmyadmin/commit/7d21d4223bdbe0306593309132b4263d7087d13b
- https://github.com/phpmyadmin/phpmyadmin/commit/7d21d4223bdbe0306593309132b4263d7087d13b
- FEDORA-2019-644b438f51
- FEDORA-2019-644b438f51
- FEDORA-2019-6404181bf9
- FEDORA-2019-6404181bf9
- FEDORA-2019-3b5a7abe17
- FEDORA-2019-3b5a7abe17
- Exploit Database
- Exploit Database
Modified: 2024-11-21
CVE-2019-18622
An issue was discovered in phpMyAdmin before 4.9.2. A crafted database/table name can be used to trigger a SQL injection attack through the designer feature.
- openSUSE-SU-2019:2599
- openSUSE-SU-2019:2599
- openSUSE-SU-2020:0056
- openSUSE-SU-2020:0056
- FEDORA-2019-8f55b515f1
- FEDORA-2019-8f55b515f1
- FEDORA-2019-db68ae1fca
- FEDORA-2019-db68ae1fca
- GLSA-202003-39
- GLSA-202003-39
- https://www.phpmyadmin.net/security/PMASA-2019-5/
- https://www.phpmyadmin.net/security/PMASA-2019-5/
Modified: 2024-11-21
CVE-2019-19617
phpMyAdmin before 4.9.2 does not escape certain Git information, related to libraries/classes/Display/GitRevision.php and libraries/classes/Footer.php.
- https://github.com/phpmyadmin/phpmyadmin/commit/1119de642b136d20e810bb20f545069a01dd7cc9
- https://github.com/phpmyadmin/phpmyadmin/commit/1119de642b136d20e810bb20f545069a01dd7cc9
- https://github.com/phpmyadmin/phpmyadmin/compare/RELEASE_4_9_1...RELEASE_4_9_2
- https://github.com/phpmyadmin/phpmyadmin/compare/RELEASE_4_9_1...RELEASE_4_9_2
- [debian-lts-announce] 20191208 [SECURITY] [DLA 2024-1] phpmyadmin security update
- [debian-lts-announce] 20191208 [SECURITY] [DLA 2024-1] phpmyadmin security update
- [debian-lts-announce] 20201025 [SECURITY] [DLA 2413-1] phpmyadmin security update
- [debian-lts-announce] 20201025 [SECURITY] [DLA 2413-1] phpmyadmin security update
- https://www.phpmyadmin.net/news/2019/11/22/phpmyadmin-492-released/
- https://www.phpmyadmin.net/news/2019/11/22/phpmyadmin-492-released/
Modified: 2024-11-21
CVE-2020-10802
In phpMyAdmin 4.x before 4.9.5 and 5.x before 5.0.2, a SQL injection vulnerability has been discovered where certain parameters are not properly escaped when generating certain queries for search actions in libraries/classes/Controllers/Table/TableSearchController.php. An attacker can generate a crafted database or table name. The attack can be performed if a user attempts certain search operations on the malicious database or table.
- openSUSE-SU-2020:0405
- openSUSE-SU-2020:0427
- openSUSE-SU-2020:1806
- [debian-lts-announce] 20200322 [SECURITY] [DLA 2154-1] phpmyadmin security update
- FEDORA-2020-25f3aea389
- FEDORA-2020-e60ce63865
- FEDORA-2020-d7b0a5a84a
- https://www.phpmyadmin.net/security/PMASA-2020-3/
- openSUSE-SU-2020:0405
- https://www.phpmyadmin.net/security/PMASA-2020-3/
- FEDORA-2020-d7b0a5a84a
- FEDORA-2020-e60ce63865
- FEDORA-2020-25f3aea389
- [debian-lts-announce] 20200322 [SECURITY] [DLA 2154-1] phpmyadmin security update
- openSUSE-SU-2020:1806
- openSUSE-SU-2020:0427
Modified: 2024-11-21
CVE-2020-10803
In phpMyAdmin 4.x before 4.9.5 and 5.x before 5.0.2, a SQL injection vulnerability was discovered where malicious code could be used to trigger an XSS attack through retrieving and displaying results (in tbl_get_field.php and libraries/classes/Display/Results.php). The attacker must be able to insert crafted data into certain database tables, which when retrieved (for instance, through the Browse tab) can trigger the XSS attack.
- openSUSE-SU-2020:0405
- openSUSE-SU-2020:0427
- openSUSE-SU-2020:1806
- [debian-lts-announce] 20200322 [SECURITY] [DLA 2154-1] phpmyadmin security update
- FEDORA-2020-25f3aea389
- FEDORA-2020-e60ce63865
- FEDORA-2020-d7b0a5a84a
- https://www.phpmyadmin.net/security/PMASA-2020-4/
- openSUSE-SU-2020:0405
- https://www.phpmyadmin.net/security/PMASA-2020-4/
- FEDORA-2020-d7b0a5a84a
- FEDORA-2020-e60ce63865
- FEDORA-2020-25f3aea389
- [debian-lts-announce] 20200322 [SECURITY] [DLA 2154-1] phpmyadmin security update
- openSUSE-SU-2020:1806
- openSUSE-SU-2020:0427
Modified: 2024-11-21
CVE-2020-10804
In phpMyAdmin 4.x before 4.9.5 and 5.x before 5.0.2, a SQL injection vulnerability was found in retrieval of the current username (in libraries/classes/Server/Privileges.php and libraries/classes/UserPassword.php). A malicious user with access to the server could create a crafted username, and then trick the victim into performing specific actions with that user account (such as editing its privileges).
- openSUSE-SU-2020:0405
- openSUSE-SU-2020:0427
- openSUSE-SU-2020:1806
- FEDORA-2020-25f3aea389
- FEDORA-2020-e60ce63865
- FEDORA-2020-d7b0a5a84a
- https://www.phpmyadmin.net/security/PMASA-2020-2/
- openSUSE-SU-2020:0405
- https://www.phpmyadmin.net/security/PMASA-2020-2/
- FEDORA-2020-d7b0a5a84a
- FEDORA-2020-e60ce63865
- FEDORA-2020-25f3aea389
- openSUSE-SU-2020:1806
- openSUSE-SU-2020:0427
Modified: 2024-11-21
CVE-2020-22278
phpMyAdmin through 5.0.2 allows CSV injection via Export Section. NOTE: the vendor disputes this because "the CSV file is accurately generated based on the database contents.
- https://cert.ikiu.ac.ir/public-files/news/document/CVE-99/CVE-2020-22278.pdf
- https://cert.ikiu.ac.ir/public-files/news/document/CVE-99/CVE-2020-22278.pdf
- https://mega.nz/file/ySQnlQSR#vXzY46mgf0CE2ysYpWpbE4O6T_g37--rtaL8pqdHcQs
- https://mega.nz/file/ySQnlQSR#vXzY46mgf0CE2ysYpWpbE4O6T_g37--rtaL8pqdHcQs
Modified: 2024-11-21
CVE-2020-5504
In phpMyAdmin 4 before 4.9.4 and 5 before 5.0.1, SQL injection exists in the user accounts page. A malicious user could inject custom SQL in place of their own username when creating queries to this page. An attacker must have a valid MySQL account to access the server.
- openSUSE-SU-2020:0056
- openSUSE-SU-2020:0056
- https://cybersecurityworks.com/zerodays/cve-2020-5504-phpmyadmin.html
- https://cybersecurityworks.com/zerodays/cve-2020-5504-phpmyadmin.html
- [debian-lts-announce] 20200115 [SECURITY] [DLA 2060-1] phpmyadmin security update
- [debian-lts-announce] 20200115 [SECURITY] [DLA 2060-1] phpmyadmin security update
- https://www.phpmyadmin.net/security/PMASA-2020-1/
- https://www.phpmyadmin.net/security/PMASA-2020-1/
Closed bugs
Too short initial value for 'blowfish_secret' parameter