Vulnerabilidad en librariesauthswekeyswekey.auth.lib.php en phpMyAdmin (CVE-2011-2719)
Gravedad CVSS v2.0:
MEDIA
Tipo:
CWE-20
Validación incorrecta de entrada
Fecha de publicación:
01/08/2011
Última modificación:
11/04/2025
Descripción
libraries/auth/swekey/swekey.auth.lib.php en phpMyAdmin v3.x anterior a v3.3.10.3 y v3.4.x anterior a v3.4.3.2 no maneja adecuadamente sesiones asociadas con autenticación Swekey, lo que permite a atacantes remotos modificar el array superglobal SESSION, otros arrays superglobal y ciertas variables locales swekey.auth.lib.php a través de consultas de cadenas manipuladas, relacionado con CVE-2011-2505.
Impacto
Puntuación base 2.0
6.40
Gravedad 2.0
MEDIA
Productos y versiones vulnerables
| CPE | Desde | Hasta |
|---|---|---|
| cpe:2.3:a:phpmyadmin:phpmyadmin:3.0.0:*:*:*:*:*:*:* | ||
| cpe:2.3:a:phpmyadmin:phpmyadmin:3.0.0:alpha:*:*:*:*:*:* | ||
| cpe:2.3:a:phpmyadmin:phpmyadmin:3.0.0:beta:*:*:*:*:*:* | ||
| cpe:2.3:a:phpmyadmin:phpmyadmin:3.0.0:rc1:*:*:*:*:*:* | ||
| cpe:2.3:a:phpmyadmin:phpmyadmin:3.0.1:*:*:*:*:*:*:* | ||
| cpe:2.3:a:phpmyadmin:phpmyadmin:3.0.1:rc1:*:*:*:*:*:* | ||
| cpe:2.3:a:phpmyadmin:phpmyadmin:3.0.1.1:*:*:*:*:*:*:* | ||
| cpe:2.3:a:phpmyadmin:phpmyadmin:3.1.0:*:*:*:*:*:*:* | ||
| cpe:2.3:a:phpmyadmin:phpmyadmin:3.1.0:beta1:*:*:*:*:*:* | ||
| cpe:2.3:a:phpmyadmin:phpmyadmin:3.1.1:*:*:*:*:*:*:* | ||
| cpe:2.3:a:phpmyadmin:phpmyadmin:3.1.1:rc1:*:*:*:*:*:* | ||
| cpe:2.3:a:phpmyadmin:phpmyadmin:3.1.2:*:*:*:*:*:*:* | ||
| cpe:2.3:a:phpmyadmin:phpmyadmin:3.1.2:rc1:*:*:*:*:*:* | ||
| cpe:2.3:a:phpmyadmin:phpmyadmin:3.1.3:*:*:*:*:*:*:* | ||
| cpe:2.3:a:phpmyadmin:phpmyadmin:3.1.3:rc1:*:*:*:*:*:* |
Para consultar la lista completa de nombres de CPE con productos y versiones, ver esta página
Referencias a soluciones, herramientas e información
- http://lists.fedoraproject.org/pipermail/package-announce/2011-August/063410.html
- http://lists.fedoraproject.org/pipermail/package-announce/2011-August/063418.html
- http://osvdb.org/74112
- http://phpmyadmin.git.sourceforge.net/git/gitweb.cgi?p=phpmyadmin/phpmyadmin%3Ba%3Dcommit%3Bh%3D571cdc6ff4bf375871b594f4e06f8ad3159d1754
- http://phpmyadmin.git.sourceforge.net/git/gitweb.cgi?p=phpmyadmin/phpmyadmin%3Ba%3Dcommit%3Bh%3De7bb42c002885c2aca7aba4d431b8c63ae4de9b7
- http://seclists.org/fulldisclosure/2011/Jul/300
- http://secunia.com/advisories/45315
- http://secunia.com/advisories/45365
- http://secunia.com/advisories/45515
- http://securityreason.com/securityalert/8322
- http://www.debian.org/security/2011/dsa-2286
- http://www.mandriva.com/security/advisories?name=MDVSA-2011%3A124
- http://www.openwall.com/lists/oss-security/2011/07/25/4
- http://www.openwall.com/lists/oss-security/2011/07/26/10
- http://www.phpmyadmin.net/home_page/security/PMASA-2011-12.php
- http://www.securityfocus.com/archive/1/518967/100/0/threaded
- http://www.securityfocus.com/archive/1/519155/100/0/threaded
- http://www.securityfocus.com/bid/48874
- http://www.xxor.se/advisories/phpMyAdmin_3.x_Conditional_Session_Manipulation.txt
- https://bugzilla.redhat.com/show_bug.cgi?id=725384
- https://exchange.xforce.ibmcloud.com/vulnerabilities/68769
- http://lists.fedoraproject.org/pipermail/package-announce/2011-August/063410.html
- http://lists.fedoraproject.org/pipermail/package-announce/2011-August/063418.html
- http://osvdb.org/74112
- http://phpmyadmin.git.sourceforge.net/git/gitweb.cgi?p=phpmyadmin/phpmyadmin%3Ba%3Dcommit%3Bh%3D571cdc6ff4bf375871b594f4e06f8ad3159d1754
- http://phpmyadmin.git.sourceforge.net/git/gitweb.cgi?p=phpmyadmin/phpmyadmin%3Ba%3Dcommit%3Bh%3De7bb42c002885c2aca7aba4d431b8c63ae4de9b7
- http://seclists.org/fulldisclosure/2011/Jul/300
- http://secunia.com/advisories/45315
- http://secunia.com/advisories/45365
- http://secunia.com/advisories/45515
- http://securityreason.com/securityalert/8322
- http://www.debian.org/security/2011/dsa-2286
- http://www.mandriva.com/security/advisories?name=MDVSA-2011%3A124
- http://www.openwall.com/lists/oss-security/2011/07/25/4
- http://www.openwall.com/lists/oss-security/2011/07/26/10
- http://www.phpmyadmin.net/home_page/security/PMASA-2011-12.php
- http://www.securityfocus.com/archive/1/518967/100/0/threaded
- http://www.securityfocus.com/archive/1/519155/100/0/threaded
- http://www.securityfocus.com/bid/48874
- http://www.xxor.se/advisories/phpMyAdmin_3.x_Conditional_Session_Manipulation.txt
- https://bugzilla.redhat.com/show_bug.cgi?id=725384
- https://exchange.xforce.ibmcloud.com/vulnerabilities/68769



