Bringing MySQL to the web

PMASA-2011-7

Announcement-ID: PMASA-2011-7

Date: 2011-07-02

Updated: 2011-07-04

Summary

Regular expression quoting issue in Synchronize code.

Description

Through a possible bug in PHP, a null byte can truncate the pattern string allowing an attacker to inject the /e modifier causing the preg_replace function to execute its second argument as PHP code.

Severity

We consider this vulnerability to be serious.

Mitigation factor

All PHP versions that were current at the time of the advisory (5.3.6, 5.2.17) on all OS are vulnerable, unless the Suhosin patch has been installed. An attacker must be logged in via phpMyAdmin to exploit this problem.

Affected Versions

The 3.4.3 and earlier versions are affected.

Unaffected Versions

Branch 2.11.x is not affected by this.

Solution

Upgrade to phpMyAdmin 3.3.10.2 or 3.4.3.1 or apply the related patch listed below.

References

This issue was found by Frans Pehrson from Xxor AB. His advisory.

Assigned CVE ids: CVE-2011-2507

CWE ids: CWE-661

Patches

The following commits have been made to fix this issue:

The following commits have been made on the 3.3 branch to fix this issue:

More information

For further information and in case of questions, please contact the phpMyAdmin team. Our website is phpmyadmin.net.