Vulnerability Details : CVE-2011-4107
Potential exploit
The simplexml_load_string function in the XML import plug-in (libraries/import/xml.php) in phpMyAdmin 3.4.x before 3.4.7.1 and 3.3.x before 3.3.10.5 allows remote authenticated users to read arbitrary files via XML data containing external entity references, aka an XML external entity (XXE) injection attack.
Vulnerability category: XML external entity (XXE) injection
Products affected by CVE-2011-4107
- cpe:2.3:o:debian:debian_linux:5.0:*:*:*:*:*:*:*
- cpe:2.3:a:phpmyadmin:phpmyadmin:*:*:*:*:*:*:*:*
- cpe:2.3:a:phpmyadmin:phpmyadmin:*:*:*:*:*:*:*:*
- cpe:2.3:o:fedoraproject:fedora:14:*:*:*:*:*:*:*
- cpe:2.3:o:fedoraproject:fedora:16:*:*:*:*:*:*:*
- cpe:2.3:o:fedoraproject:fedora:15:*:*:*:*:*:*:*
Exploit prediction scoring system (EPSS) score for CVE-2011-4107
4.19%
Probability of exploitation activity in the next 30 days
EPSS Score History
~ 92 %
Percentile, the proportion of vulnerabilities that are scored at or less
CVSS scores for CVE-2011-4107
Base Score | Base Severity | CVSS Vector | Exploitability Score | Impact Score | Score Source | First Seen |
---|---|---|---|---|---|---|
4.3
|
MEDIUM | AV:N/AC:M/Au:N/C:P/I:N/A:N |
8.6
|
2.9
|
NIST | |
6.5
|
MEDIUM | CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N |
2.8
|
3.6
|
NIST | 2024-02-09 |
CWE ids for CVE-2011-4107
-
The product exposes sensitive information to an actor that is not explicitly authorized to have access to that information.Assigned by: nvd@nist.gov (Primary)
-
The product processes an XML document that can contain XML entities with URIs that resolve to documents outside of the intended sphere of control, causing the product to embed incorrect documents into its output.Assigned by: nvd@nist.gov (Primary)
References for CVE-2011-4107
-
http://securityreason.com/securityalert/8533
phpMyAdmin Arbitrary File Read - CXSecurity.comBroken Link
-
http://lists.fedoraproject.org/pipermail/package-announce/2011-November/069625.html
[SECURITY] Fedora 16 Update: phpMyAdmin-3.4.7.1-1.fc16Mailing List;Third Party Advisory
-
http://lists.fedoraproject.org/pipermail/package-announce/2011-November/069649.html
[SECURITY] Fedora 14 Update: phpMyAdmin-3.4.7.1-1.fc14Mailing List;Third Party Advisory
-
http://packetstormsecurity.org/files/view/106511/phpmyadmin-fileread.txt
phpMyAdmin Arbitrary File Read ≈ Packet StormBroken Link;Exploit
-
http://www.wooyun.org/bugs/wooyun-2010-03185
升级中Broken Link;Exploit
-
http://www.openwall.com/lists/oss-security/2011/11/03/3
oss-security - CVE Request -- phpMyAdmin -- Arbitrary local file read flaw by loading XML strings / importing XML filesMailing List
-
https://bugzilla.redhat.com/show_bug.cgi?id=751112
751112 – (CVE-2011-4107) CVE-2011-4107 phpMyAdmin: Arbitrary file read flaw by loading XML stringsExploit;Issue Tracking
-
http://www.openwall.com/lists/oss-security/2011/11/03/5
oss-security - Re: CVE Request -- phpMyAdmin -- Arbitrary local file read flaw by loading XML strings / importing XML filesMailing List
-
http://osvdb.org/76798
Broken Link
-
http://www.debian.org/security/2012/dsa-2391
Debian -- Security Information -- DSA-2391-1 phpmyadminMailing List
-
http://secunia.com/advisories/46447
Sign inBroken Link;Vendor Advisory
-
http://www.securityfocus.com/bid/50497
phpMyAdmin 'simplexml_load_string()' Function Information Disclosure VulnerabilityBroken Link;Third Party Advisory;VDB Entry
-
https://exchange.xforce.ibmcloud.com/vulnerabilities/71108
phpMyAdmin xml.php information disclosure CVE-2011-4107 Vulnerability ReportThird Party Advisory;VDB Entry
-
http://lists.fedoraproject.org/pipermail/package-announce/2011-November/069635.html
[SECURITY] Fedora 15 Update: phpMyAdmin-3.4.7.1-1.fc15Mailing List;Third Party Advisory
-
http://www.phpmyadmin.net/home_page/security/PMASA-2011-17.php
phpMyAdmin - Security - PMASA-2011-17Patch;Vendor Advisory
-
http://seclists.org/fulldisclosure/2011/Nov/21
Full Disclosure: PhpMyAdmin Arbitrary File ReadingExploit;Mailing List;Third Party Advisory
-
http://www.mandriva.com/security/advisories?name=MDVSA-2011:198
mandriva.comBroken Link
Jump to