CVE-2011-4107

The simplexml_load_string function in the XML import plug-in (libraries/import/xml.php) in phpMyAdmin 3.4.x before 3.4.7.1 and 3.3.x before 3.3.10.5 allows remote authenticated users to read arbitrary files via XML data containing external entity references, aka an XML external entity (XXE) injection attack.
References
Link Resource
http://lists.fedoraproject.org/pipermail/package-announce/2011-November/069625.html Mailing List Third Party Advisory
http://lists.fedoraproject.org/pipermail/package-announce/2011-November/069635.html Mailing List Third Party Advisory
http://lists.fedoraproject.org/pipermail/package-announce/2011-November/069649.html Mailing List Third Party Advisory
http://osvdb.org/76798 Broken Link
http://packetstormsecurity.org/files/view/106511/phpmyadmin-fileread.txt Broken Link Exploit
http://seclists.org/fulldisclosure/2011/Nov/21 Exploit Mailing List Third Party Advisory
http://secunia.com/advisories/46447 Broken Link Vendor Advisory
http://securityreason.com/securityalert/8533 Broken Link
http://www.debian.org/security/2012/dsa-2391 Mailing List
http://www.mandriva.com/security/advisories?name=MDVSA-2011:198 Broken Link
http://www.openwall.com/lists/oss-security/2011/11/03/3 Mailing List
http://www.openwall.com/lists/oss-security/2011/11/03/5 Mailing List
http://www.phpmyadmin.net/home_page/security/PMASA-2011-17.php Patch Vendor Advisory
http://www.securityfocus.com/bid/50497 Broken Link Third Party Advisory VDB Entry
http://www.wooyun.org/bugs/wooyun-2010-03185 Broken Link Exploit
https://bugzilla.redhat.com/show_bug.cgi?id=751112 Exploit Issue Tracking
https://exchange.xforce.ibmcloud.com/vulnerabilities/71108 Third Party Advisory VDB Entry
http://lists.fedoraproject.org/pipermail/package-announce/2011-November/069625.html Mailing List Third Party Advisory
http://lists.fedoraproject.org/pipermail/package-announce/2011-November/069635.html Mailing List Third Party Advisory
http://lists.fedoraproject.org/pipermail/package-announce/2011-November/069649.html Mailing List Third Party Advisory
http://osvdb.org/76798 Broken Link
http://packetstormsecurity.org/files/view/106511/phpmyadmin-fileread.txt Broken Link Exploit
http://seclists.org/fulldisclosure/2011/Nov/21 Exploit Mailing List Third Party Advisory
http://secunia.com/advisories/46447 Broken Link Vendor Advisory
http://securityreason.com/securityalert/8533 Broken Link
http://www.debian.org/security/2012/dsa-2391 Mailing List
http://www.mandriva.com/security/advisories?name=MDVSA-2011:198 Broken Link
http://www.openwall.com/lists/oss-security/2011/11/03/3 Mailing List
http://www.openwall.com/lists/oss-security/2011/11/03/5 Mailing List
http://www.phpmyadmin.net/home_page/security/PMASA-2011-17.php Patch Vendor Advisory
http://www.securityfocus.com/bid/50497 Broken Link Third Party Advisory VDB Entry
http://www.wooyun.org/bugs/wooyun-2010-03185 Broken Link Exploit
https://bugzilla.redhat.com/show_bug.cgi?id=751112 Exploit Issue Tracking
https://exchange.xforce.ibmcloud.com/vulnerabilities/71108 Third Party Advisory VDB Entry
Configurations

Configuration 1 (hide)

OR cpe:2.3:a:phpmyadmin:phpmyadmin:*:*:*:*:*:*:*:*
cpe:2.3:a:phpmyadmin:phpmyadmin:*:*:*:*:*:*:*:*

Configuration 2 (hide)

OR cpe:2.3:o:fedoraproject:fedora:14:*:*:*:*:*:*:*
cpe:2.3:o:fedoraproject:fedora:15:*:*:*:*:*:*:*
cpe:2.3:o:fedoraproject:fedora:16:*:*:*:*:*:*:*

Configuration 3 (hide)

cpe:2.3:o:debian:debian_linux:5.0:*:*:*:*:*:*:*

History

No history.

Information

Published : 2011-11-17 19:55

Updated : 2025-04-11 00:51


NVD link : CVE-2011-4107

Mitre link : CVE-2011-4107

CVE.ORG link : CVE-2011-4107


JSON object : View

Products Affected

phpmyadmin

  • phpmyadmin

fedoraproject

  • fedora

debian

  • debian_linux
CWE
CWE-611

Improper Restriction of XML External Entity Reference