Date: Wed, 29 Mar 2017 16:47:40 +0000 (UTC) From: Matthew Seaman <matthew@FreeBSD.org> To: ports-committers@freebsd.org, svn-ports-all@freebsd.org, svn-ports-head@freebsd.org Subject: svn commit: r437212 - head/security/vuxml Message-ID: <201703291647.v2TGleHQ072179@repo.freebsd.org>
next in thread | raw e-mail | index | archive | help
Author: matthew Date: Wed Mar 29 16:47:39 2017 New Revision: 437212 URL: https://svnweb.freebsd.org/changeset/ports/437212 Log: phpMyAdmin: document PMASA-2017-8 -- bypass restrictions on 'no password' accounts. Modified: head/security/vuxml/vuln.xml Modified: head/security/vuxml/vuln.xml ============================================================================== --- head/security/vuxml/vuln.xml Wed Mar 29 16:45:39 2017 (r437211) +++ head/security/vuxml/vuln.xml Wed Mar 29 16:47:39 2017 (r437212) @@ -58,6 +58,45 @@ Notes: * Do not forget port variants (linux-f10-libxml2, libxml2, etc.) --> <vuxml xmlns="http://www.vuxml.org/apps/vuxml-1"> + <vuln vid="68611303-149e-11e7-b9bb-6805ca0b3d42"> + <topic>phpMyAdmin -- bypass 'no password' restriction</topic> + <affects> + <package> + <name>phpMyAdmin</name> + <range><lt>4.7.0</lt></range> + </package> + </affects> + <description> + <body xmlns="http://www.w3.org/1999/xhtml"> + <p>The phpMYAdmin team reports:</p> + <blockquote cite="https://www.phpmyadmin.net/security/PMASA-2017-8/"> + <h3>Summary</h3> + <p>Bypass $cfg['Servers'][$i]['AllowNoPassword']</p> + <h3>Description</h3> + <p>A vulnerability was discovered where the restrictions + caused by $cfg['Servers'][$i]['AllowNoPassword'] = false are + bypassed under certain PHP versions. This can allow the + login of users who have no password set even if the + administrator has set $cfg['Servers'][$i]['AllowNoPassword'] + to false (which is also the default).</p> + <p>This behavior depends on the PHP version used (it seems + PHP 5 is affected, while PHP 7.0 is not).</p> + <h3>Severity</h3> + <p>We consider this vulnerability to be of moderate severity.</p> + <h3>Mitigation factor</h3> + <p>Set a password for all users.</p> + </blockquote> + </body> + </description> + <references> + <url>https://www.phpmyadmin.net/security/PMASA-2017-8/</url> + </references> + <dates> + <discovery>2017-03-28</discovery> + <entry>2017-03-29</entry> + </dates> + </vuln> + <vuln vid="04bc4e23-9a70-42cb-9fec-3613632d34bc"> <topic>hostapd -- multiple vulnerabilities</topic> <affects>
Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?201703291647.v2TGleHQ072179>