Vulnerability Details : CVE-2008-1567
phpMyAdmin before 2.11.5.1 stores the MySQL (1) username and (2) password, and the (3) Blowfish secret key, in cleartext in a Session file under /tmp, which allows local users to obtain sensitive information.
Products affected by CVE-2008-1567
- cpe:2.3:o:debian:debian_linux:4.0:*:*:*:*:*:*:*
- cpe:2.3:a:phpmyadmin:phpmyadmin:*:*:*:*:*:*:*:*
- cpe:2.3:o:fedoraproject:fedora:8:*:*:*:*:*:*:*
- cpe:2.3:o:fedoraproject:fedora:7:*:*:*:*:*:*:*
- cpe:2.3:o:opensuse:opensuse:11.0:*:*:*:*:*:*:*
- cpe:2.3:o:opensuse:opensuse:10.3:*:*:*:*:*:*:*
- cpe:2.3:o:opensuse:opensuse:10.2:*:*:*:*:*:*:*
Exploit prediction scoring system (EPSS) score for CVE-2008-1567
0.04%
Probability of exploitation activity in the next 30 days
EPSS Score History
~ 8 %
Percentile, the proportion of vulnerabilities that are scored at or less
CVSS scores for CVE-2008-1567
Base Score | Base Severity | CVSS Vector | Exploitability Score | Impact Score | Score Source | First Seen |
---|---|---|---|---|---|---|
2.1
|
LOW | AV:L/AC:L/Au:N/C:P/I:N/A:N |
3.9
|
2.9
|
NIST | |
5.5
|
MEDIUM | CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N |
1.8
|
3.6
|
NIST | 2024-02-14 |
CWE ids for CVE-2008-1567
-
The product exposes sensitive information to an actor that is not explicitly authorized to have access to that information.Assigned by: nvd@nist.gov (Primary)
-
The product stores sensitive information in cleartext within a resource that might be accessible to another control sphere.Assigned by: nvd@nist.gov (Primary)
References for CVE-2008-1567
-
https://exchange.xforce.ibmcloud.com/vulnerabilities/41541
phpMyAdmin session data information disclosure CVE-2008-1567 Vulnerability ReportThird Party Advisory;VDB Entry
-
http://secunia.com/advisories/29613
About Secunia Research | FlexeraBroken Link;Vendor Advisory
-
http://sourceforge.net/tracker/index.php?func=detail&aid=1909711&group_id=23067&atid=377408
phpMyAdmin / Bugs / #2653 (ok 2.11.5.1) Sensitive data in session filesIssue Tracking;Third Party Advisory
-
https://www.redhat.com/archives/fedora-package-announce/2008-April/msg00080.html
[SECURITY] Fedora 7 Update: phpMyAdmin-2.11.5.1-1.fc7Mailing List
-
http://lists.opensuse.org/opensuse-security-announce/2008-11/msg00002.html
[security-announce] SUSE Security Summary Report: SUSE-SR:2008:026 - openSUSE Security Announce - openSUSE Mailing ListsMailing List
-
http://www.debian.org/security/2008/dsa-1557
[SECURITY] [DSA 1557-1] New phpmyadmin packages fix several vulnerabilitiesMailing List;Patch
-
http://secunia.com/advisories/33822
About Secunia Research | FlexeraBroken Link;Vendor Advisory
-
http://www.securityfocus.com/bid/28560
Broken Link;Patch;Third Party Advisory;VDB Entry
-
http://secunia.com/advisories/29588
About Secunia Research | FlexeraBroken Link;Vendor Advisory
-
http://secunia.com/advisories/30816
About Secunia Research | FlexeraBroken Link;Vendor Advisory
-
http://secunia.com/advisories/32834
About Secunia Research | FlexeraBroken Link;Vendor Advisory
-
http://secunia.com/advisories/29964
About Secunia Research | FlexeraBroken Link;Vendor Advisory
-
http://lists.opensuse.org/opensuse-security-announce/2009-02/msg00000.html
[security-announce] SUSE Security Summary Report: SUSE-SR:2009:003 - openSUSE Security Announce - openSUSE Mailing ListsMailing List
-
http://www.phpmyadmin.net/home_page/security.php?issue=PMASA-2008-2
phpMyAdmin - Security - PMASA-2008-2Patch;Vendor Advisory
-
https://www.redhat.com/archives/fedora-package-announce/2008-April/msg00031.html
[SECURITY] Fedora 8 Update: phpMyAdmin-2.11.5.1-1.fc8Mailing List
-
http://www.vupen.com/english/advisories/2008/1037/references
Webmail: access your OVH emails on ovhcloud.com | OVHcloudBroken Link;Vendor Advisory
-
http://www.mandriva.com/security/advisories?name=MDVSA-2008:131
MandrivaBroken Link
Jump to