<?xml version="1.0" encoding="UTF-8"?>
<cvrfdoc xmlns="http://www.icasi.org/CVRF/schema/cvrf/1.1" xmlns:cvrf="http://www.icasi.org/CVRF/schema/cvrf/1.1">
  <DocumentTitle xml:lang="en">Security update for phpMyAdmin</DocumentTitle>
  <DocumentType>SUSE Patch</DocumentType>
  <DocumentPublisher Type="Vendor">
    <ContactDetails>security@suse.de</ContactDetails>
    <IssuingAuthority>SUSE Security Team</IssuingAuthority>
  </DocumentPublisher>
  <DocumentTracking>
    <Identification>
      <ID>openSUSE-SU-2018:4124-1</ID>
    </Identification>
    <Status>Final</Status>
    <Version>1</Version>
    <RevisionHistory>
      <Revision>
        <Number>1</Number>
        <Date>2018-12-14T13:16:06Z</Date>
        <Description>current</Description>
      </Revision>
    </RevisionHistory>
    <InitialReleaseDate>2018-12-14T13:16:06Z</InitialReleaseDate>
    <CurrentReleaseDate>2018-12-14T13:16:06Z</CurrentReleaseDate>
    <Generator>
      <Engine>cve-database/bin/generate-cvrf.pl</Engine>
      <Date>2017-02-24T01:00:00Z</Date>
    </Generator>
  </DocumentTracking>
  <DocumentNotes>
    <Note Title="Topic" Type="Summary" Ordinal="1" xml:lang="en">Security update for phpMyAdmin</Note>
    <Note Title="Details" Type="General" Ordinal="2" xml:lang="en">This update for phpMyAdmin fixes security issues and bugs.

Security issues addressed in the 4.8.4 release (bsc#1119245):

- CVE-2018-19968: Local file inclusion through transformation feature
- CVE-2018-19969: XSRF/CSRF vulnerability
- CVE-2018-19970: XSS vulnerability in navigation tree

This update also contains the following upstream bug fixes and improvements:

- Ensure that database names with a dot ('.') are handled properly when DisableIS is true
- Fix for message &amp;quot;Error while copying database (pma__column_info)&amp;quot;
- Move operation causes &amp;quot;SELECT * FROM `undefined`&amp;quot; error
- When logging with $cfg['AuthLog'] to syslog, successful login messages were not logged
  when $cfg['AuthLogSuccess'] was true
- Multiple errors and regressions with Designer
    </Note>
    <Note Title="Terms of Use" Type="Legal Disclaimer" Ordinal="3" xml:lang="en">The CVRF data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).</Note>
  </DocumentNotes>
  <DocumentDistribution xml:lang="en">Copyright SUSE LLC under the Creative Commons License 4.0 with Attribution (CC-BY-4.0)</DocumentDistribution>
  <DocumentReferences>
    <Reference Type="Self">
      <URL>http://lists.opensuse.org/opensuse-security-announce/2018-12/msg00032.html</URL>
      <Description>E-Mail link for openSUSE-SU-2018:4124-1</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/support/security/rating/</URL>
      <Description>SUSE Security Ratings</Description>
    </Reference>
  </DocumentReferences>
  <ProductTree xmlns="http://www.icasi.org/CVRF/schema/prod/1.1">
    <Branch Type="Product Family" Name="SUSE Package Hub for SUSE Linux Enterprise 12">
      <Branch Type="Product Name" Name="SUSE Package Hub for SUSE Linux Enterprise 12">
        <FullProductName ProductID="SUSE Package Hub for SUSE Linux Enterprise 12">SUSE Package Hub for SUSE Linux Enterprise 12</FullProductName>
      </Branch>
    </Branch>
    <Branch Type="Product Family" Name="SUSE Package Hub for SUSE Linux Enterprise 15">
      <Branch Type="Product Name" Name="SUSE Package Hub for SUSE Linux Enterprise 15">
        <FullProductName ProductID="SUSE Package Hub for SUSE Linux Enterprise 15">SUSE Package Hub for SUSE Linux Enterprise 15</FullProductName>
      </Branch>
    </Branch>
    <Branch Type="Product Version" Name="phpMyAdmin-4.8.4-bp150.3.6.1">
      <FullProductName ProductID="phpMyAdmin-4.8.4-bp150.3.6.1">phpMyAdmin-4.8.4-bp150.3.6.1</FullProductName>
    </Branch>
    <Relationship ProductReference="phpMyAdmin-4.8.4-bp150.3.6.1" RelationType="Default Component Of" RelatesToProductReference="SUSE Package Hub for SUSE Linux Enterprise 12">
      <FullProductName ProductID="SUSE Package Hub for SUSE Linux Enterprise 12:phpMyAdmin-4.8.4-bp150.3.6.1">phpMyAdmin-4.8.4-bp150.3.6.1 as a component of SUSE Package Hub for SUSE Linux Enterprise 12</FullProductName>
    </Relationship>
    <Relationship ProductReference="phpMyAdmin-4.8.4-bp150.3.6.1" RelationType="Default Component Of" RelatesToProductReference="SUSE Package Hub for SUSE Linux Enterprise 15">
      <FullProductName ProductID="SUSE Package Hub for SUSE Linux Enterprise 15:phpMyAdmin-4.8.4-bp150.3.6.1">phpMyAdmin-4.8.4-bp150.3.6.1 as a component of SUSE Package Hub for SUSE Linux Enterprise 15</FullProductName>
    </Relationship>
  </ProductTree>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="1">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">An attacker can exploit phpMyAdmin before 4.8.4 to leak the contents of a local file because of an error in the transformation feature. The attacker must have access to the phpMyAdmin Configuration Storage tables, although these can easily be created in any database to which the attacker has access. An attacker must have valid credentials to log in to phpMyAdmin; this vulnerability does not allow an attacker to circumvent the login system.</Note>
    </Notes>
    <CVE>CVE-2018-19968</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>SUSE Package Hub for SUSE Linux Enterprise 12:phpMyAdmin-4.8.4-bp150.3.6.1</ProductID>
        <ProductID>SUSE Package Hub for SUSE Linux Enterprise 15:phpMyAdmin-4.8.4-bp150.3.6.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">Please Install the update.</Description>
        <URL>http://lists.opensuse.org/opensuse-security-announce/2018-12/msg00032.html</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2018-19968.html</URL>
        <Description>CVE-2018-19968</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1119245</URL>
        <Description>SUSE Bug 1119245</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="2">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">phpMyAdmin 4.7.x and 4.8.x versions prior to 4.8.4 are affected by a series of CSRF flaws. By deceiving a user into clicking on a crafted URL, it is possible to perform harmful SQL operations such as renaming databases, creating new tables/routines, deleting designer pages, adding/deleting users, updating user passwords, killing SQL processes, etc.</Note>
    </Notes>
    <CVE>CVE-2018-19969</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>SUSE Package Hub for SUSE Linux Enterprise 12:phpMyAdmin-4.8.4-bp150.3.6.1</ProductID>
        <ProductID>SUSE Package Hub for SUSE Linux Enterprise 15:phpMyAdmin-4.8.4-bp150.3.6.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">Please Install the update.</Description>
        <URL>http://lists.opensuse.org/opensuse-security-announce/2018-12/msg00032.html</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2018-19969.html</URL>
        <Description>CVE-2018-19969</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1119245</URL>
        <Description>SUSE Bug 1119245</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="3">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">In phpMyAdmin before 4.8.4, an XSS vulnerability was found in the navigation tree, where an attacker can deliver a payload to a user through a crafted database/table name.</Note>
    </Notes>
    <CVE>CVE-2018-19970</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>SUSE Package Hub for SUSE Linux Enterprise 12:phpMyAdmin-4.8.4-bp150.3.6.1</ProductID>
        <ProductID>SUSE Package Hub for SUSE Linux Enterprise 15:phpMyAdmin-4.8.4-bp150.3.6.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">Please Install the update.</Description>
        <URL>http://lists.opensuse.org/opensuse-security-announce/2018-12/msg00032.html</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2018-19970.html</URL>
        <Description>CVE-2018-19970</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1119245</URL>
        <Description>SUSE Bug 1119245</Description>
      </Reference>
    </References>
  </Vulnerability>
</cvrfdoc>
