Vulnerability Name: | CVE-2009-1149 (CCN-49429) | ||||||||
Assigned: | 2009-03-24 | ||||||||
Published: | 2009-03-24 | ||||||||
Updated: | 2009-04-16 | ||||||||
Summary: | CRLF injection vulnerability in bs_disp_as_mime_type.php in the BLOB streaming feature in phpMyAdmin before 3.1.3.1 allows remote attackers to inject arbitrary HTTP headers and conduct HTTP response splitting attacks via the (1) c_type and possibly (2) file_type parameters. | ||||||||
CVSS v3 Severity: | 5.3 Medium (CCN CVSS v3.1 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N)
| ||||||||
CVSS v2 Severity: | 7.5 High (CVSS v2 Vector: AV:N/AC:L/Au:N/C:P/I:P/A:P) 5.5 Medium (Temporal CVSS v2 Vector: AV:N/AC:L/Au:N/C:P/I:P/A:P/E:U/RL:OF/RC:C)
3.2 Low (CCN Temporal CVSS v2 Vector: AV:N/AC:M/Au:N/C:N/I:P/A:N/E:U/RL:OF/RC:C)
| ||||||||
Vulnerability Type: | CWE-20 | ||||||||
Vulnerability Consequences: | Gain Access | ||||||||
References: | Source: MITRE Type: CNA CVE-2009-1149 Source: SUSE Type: UNKNOWN SUSE-SR:2009:008 Source: MISC Type: Patch http://phpmyadmin.svn.sourceforge.net/viewvc/phpmyadmin/branches/MAINT_3_1_3/phpMyAdmin/bs_disp_as_mime_type.php?r1=12303&r2=12302&pathrev=12303 Source: CCN Type: SA34468 phpMyAdmin File Inclusion and HTTP Response Splitting Source: SECUNIA Type: UNKNOWN 34468 Source: SECUNIA Type: UNKNOWN 34642 Source: CCN Type: OSVDB ID: 53227 phpMyAdmin BLOB Streaming Feature bs_disp_as_mime_type.php Multiple Parameter HTTP Response Splitting Source: CCN Type: PMASA-2009-1 HTTP Response Splitting and file inclusion vulnerability Source: CONFIRM Type: Patch, Vendor Advisory http://www.phpmyadmin.net/home_page/security/PMASA-2009-1.php Source: CCN Type: BID-34253 phpMyAdmin BLOB Streaming Multiple Input Validation Vulnerabilities Source: XF Type: UNKNOWN phpmyadmin-blob-response-splitting(49429) Source: SUSE Type: SUSE-SR:2009:008 SUSE Security Summary Report | ||||||||
Vulnerable Configuration: | Configuration 1: Configuration CCN 1: Denotes that component is vulnerable | ||||||||
Oval Definitions | |||||||||
| |||||||||
BACK |