Follow @Openwall on Twitter for new release announcements and other news
[<prev] [next>] [thread-next>] [day] [month] [year] [list]
Message-ID: <CAE5KnOcuXNeEZz90V6Vs1AbyvNvTfs8TT0otjAj6-3mnttUDZQ@mail.gmail.com>
Date: Mon, 21 Oct 2013 20:38:17 +0530
From: Anant Shrivastava <anant@...ntshri.info>
To: oss-security@...ts.openwall.com
Cc: plugins@...dpress.org, Ciprian Popescu <ciprian@...butterfly.com>
Subject: CVE for Wordpress plugin Portable-phpmyadmin

Hi Team,

Please issue CVE for following issues identified in a wordpress plugin
portable-phpmyadmin


*PHP information Disclosure
*
/pma/phpinfo.php

*Security Bypass *
Allows direct access (with each file level of access differs but you get DB
access with wordpress database username and password)
/pma/db_create.php
/pma/main.php - reveals all the details of database stuff.
/pma/db_datadict.php
/pma/import.php
/pma/querywindow.php
/pma/server_databases.php - Full access to all features including SQL window
/pma/server_export.php


*Disclosure Status.
*
Author (marked in CC) as well as Wordpress Plugin team (marked in CC) is
aware of the issues.
Wordpress plugin team has disabled the plugin download till issues are
resolved.
Author initially responded but stopped responding after a point.

*Timeline*
First contact : 24 July 2013
Last response from Author : 9 Aug 2013
Wordpress plugin team contacted : 11 Sep 2013
Plugin Disabled in plugin repository : 15 Sep 2013
CVE Requested : 21 Oct 2013


-Anant Shrivastava

Powered by blists - more mailing lists

Please check out the Open Source Software Security Wiki, which is counterpart to this mailing list.

Confused about mailing lists and their use? Read about mailing lists on Wikipedia and check out these guidelines on proper formatting of your messages.